|By Marketwired .||
|April 30, 2014 01:47 PM EDT||
KENNEBUNK, ME -- (Marketwired) -- 04/30/14 -- Plixer International, Inc., a leader in NetFlow and IPFIX analytics and network threat detection, today announced Thomas Pore, director of IT & services, will be speaking at this year's 2014 U.S. Cyber Crime Conference. Pore's discussion entitled, "How to Implement Flow Technologies for Network Threat Detection," will be held on May 1st from 3:00-3:50pm at the National Conference Center, Dulles Airport, Va.
The U.S. Cyber Crime Conference provides both hands-on digital forensics training and an interactive forum for cyber professionals to network. The conference covers the full spectrum of topics facing defenders, as well as law enforcement responders. Over 160 breakout sessions will cover all aspects of computer crime, including intrusion investigations, cybercrime law, digital forensics, information assurance, along with research and development, and testing of digital forensic tools.
"With cybercrime accounting for billions in losses, it is clear security implementations have left openings for criminals," Pore said. "Even when companies deploy cyber threat detection, botnet and malware can still enter, disguising itself as normal network traffic to transfer source code and other vital company secrets. Watching outbound network traffic with flow technologies provides a critical network threat detection layer that significantly improves the discovery of malicious activity."
Pore will discuss how flow technologies can be implemented to:
1. Identify malicious activity within and from outside an organization.
2. Utilize root-cause indicator collection for actionable intelligence when searching for additional compromise areas and lateral movement.
3. Find Ransomware - highlighting a real-world investigation case study that pinpointed the root cause of infection including URLs, timeframes, encoded malicious calls, beaconing, and more.
Plixer's network threat detection solution, Scrutinizer, is used throughout the world to help IT administrators and network security personnel identify and stop cyber-criminal activity. To schedule a live demo, call: (207) 324-8805 or via email at [email protected].
For more flow technology insight, follow Plixer International on their Blog, Twitter, Facebook or join NetFlow Developments Group on LinkedIn. To learn about these new features, register for an Advanced NetFlow Training classes offered by Plixer nationwide.
Plixer International, Inc. is a leading NetFlow, IPFIX and sFlow solution provider specializing in network threat detection, historical reporting and capacity base-lining for both physical and virtual environments. They assist customers implementing and troubleshooting: VoIP, Telepresence, Unified Communications and other time sensitive applications. Plixer tools have been used to analyze and troubleshoot irregular traffic patterns by IT professionals with some of the largest networks in the world, such as CNN, The Coca-Cola Company, Lockheed Martin, IBM, Regal Cinemas, Raytheon, and Eddie Bauer.
BridgeView Marketing for Plixer
U.S. +1 603-886-7087
910Telecom exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and exchanges.
Feb. 25, 2017 03:15 AM EST Reads: 1,709
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Feb. 25, 2017 03:00 AM EST Reads: 3,991
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Feb. 25, 2017 03:00 AM EST Reads: 2,004
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
Feb. 25, 2017 02:15 AM EST Reads: 5,357
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, will highlight the current challenges of these transformative technologies and share strategies for preparing your organization for these changes. This “view from the top” will outline the latest trends and developm...
Feb. 25, 2017 02:00 AM EST Reads: 2,418
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 25, 2017 02:00 AM EST Reads: 6,607
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Feb. 25, 2017 01:45 AM EST Reads: 4,520
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Feb. 25, 2017 01:45 AM EST Reads: 5,850
China Unicom exhibit at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE FDD, TD-LTE), fixed-line broadband, ICT, data communica...
Feb. 25, 2017 01:30 AM EST Reads: 1,276
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
Feb. 25, 2017 01:00 AM EST Reads: 1,535
In recent years, containers have taken the world by storm. Companies of all sizes and industries have realized the massive benefits of containers, such as unprecedented mobility, higher hardware utilization, and increased flexibility and agility; however, many containers today are non-persistent. Containers without persistence miss out on many benefits, and in many cases simply pass the responsibility of persistence onto other infrastructure, adding additional complexity.
Feb. 25, 2017 12:45 AM EST Reads: 1,130
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Feb. 24, 2017 11:30 PM EST Reads: 6,430
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 24, 2017 10:30 PM EST Reads: 1,810
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Feb. 24, 2017 09:30 PM EST Reads: 8,406
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 24, 2017 09:15 PM EST Reads: 1,628