POPULARITY
Today I will discuss: 1. What is the importance of IPS/IDS? 2. Why should you use IPS/IDS in your network? 3. How can IDS/IPS stop many cyber-attacks? Watch
On the 27th episode of the show, I’m joined by Stijn Vanveerdeghem, Senior Technical Product Manager at VMware. Distributed IPS/IDS (Intrusion Prevention and Detection System) on NSX-T was one of the biggest announcements at VMworld 2019 Europe. Stijn is the Technical Product Manager behind this feature and he took the time to explain us what VMware is bringing to the security market and what are the distinctive benefits that customers can gain from using this feature. You can reach out to Stijn via LinkedIn (https://www.linkedin.com/in/stijnvanv/). Virtual Stack is available on all major apps: Apple Podcast, Spotify, Google Podcast, Stitcher and more. Hope you enjoy the show. As usual, feel free to share your feedback via Twitter (@emregirici), LinkedIn or virtualstack.tech. Show notes: 02:00 - Intro 04:45 - What did VMware announce in VMworld 2019 Europe? 07:50 - What is IPS/IDS and what is the difference between IDS/IPS and a Firewall and NGFW (Next-gen FW) 15:00 - Can you talk about the use cases for Distributed IDS? 21:00 - What additional benefits does VMware bring to the customer? 29:15 - Can you tell us a bit more about the Architecture? 35:30 - What are the NSX-T IPS/IDS signatures based on? 37:15 - What about the general availability? 38:30 - Closing notes Links: VMworld 2019 Europe session: What's New with NSX-T Micro-Segmentation (SAI2565BE)(IPS/IDS is covered at the end) Official Product Page VMware Blog about the feature announcement
En este capítulo haré una introducción al funcionamiento de los IPS/IDS, indicando qué los diferencia de los firewall (aunque hoy en día la mayoría de soluciones firewall incorporan servicios IDS/IPS), y cuál es la ubicación oportuna para montarlo dentro de nuestra red.
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Todays headlines are rife with high profile information leakage cases affecting major corporations and government institutions. Most of the highest-profile leakage news has about been stolen laptops (VA, CPS), or large-scale external compromises of customer databases (TJX). On a less covered, but much more commonplace basis, sensitive financial data, company secrets, and customer information move in and out of networks and on and off of company systems all the time. Where it goes can be hard to pin down. How can a company prevent (let alone detect) Alice taking a snapshot of the customer database or financial projections and posting them on internet forums or even dumping them to a floppy disk? This, understandably, has a lot of people worried. In response, many organizations have begun looking for technologies to detect and prevent sensitive information from leaving their networks, servers, workstations, and even buildings. For some time a product space for ""Extrusion Detection"" products has existed. But now the space is exploding and as tends to happen, security problems abound. Some ""Extrusion Detections"" products rely on network gateway IPS/IDS approaches, whereas others work in a way more closely resembling host-based IDS/IPS. The main difference is that instead of detecting/preventing malicious information from entering a company's perimeter, they focus on keeping assets *inside*. We've been evaluating a number of products in this space and have run across a large number of vulnerabilities. They range from improper evidence handling, to inherent design issues, all the way to complete compromise of an enterprise, using the Extrusion Detection framework itself as the vehicle.
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Todays headlines are rife with high profile information leakage cases affecting major corporations and government institutions. Most of the highest-profile leakage news has about been stolen laptops (VA, CPS), or large-scale external compromises of customer databases (TJX). On a less covered, but much more commonplace basis, sensitive financial data, company secrets, and customer information move in and out of networks and on and off of company systems all the time. Where it goes can be hard to pin down. How can a company prevent (let alone detect) Alice taking a snapshot of the customer database or financial projections and posting them on internet forums or even dumping them to a floppy disk? This, understandably, has a lot of people worried. In response, many organizations have begun looking for technologies to detect and prevent sensitive information from leaving their networks, servers, workstations, and even buildings. For some time a product space for ""Extrusion Detection"" products has existed. But now the space is exploding and as tends to happen, security problems abound. Some ""Extrusion Detections"" products rely on network gateway IPS/IDS approaches, whereas others work in a way more closely resembling host-based IDS/IPS. The main difference is that instead of detecting/preventing malicious information from entering a company's perimeter, they focus on keeping assets *inside*. We've been evaluating a number of products in this space and have run across a large number of vulnerabilities. They range from improper evidence handling, to inherent design issues, all the way to complete compromise of an enterprise, using the Extrusion Detection framework itself as the vehicle.