advertisement

Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis

50 %
50 %
advertisement
Information about Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic...

Published on June 6, 2008

Author: gigamonster

Source: slideshare.net

Description

Reconnex is the leader in information monitoring and protection appliances designed for any organization, including enterprises, government agencies or education institutions that want to protect their brands, maintain compliance, or protect sensitive information. A privately-held company based in Silicon Valley, Calif., Reconnex protects information for companies such as Cadence, WebEx Communications, The George Washington University, SIRVA and Maimonides Medical Center.
advertisement

Ratinder Paul Singh Ahuja, Ph.D C.O.O & C.T.O 05/02/06 Reconnex Confidential

Reconnex performs content monitoring, alerting, and forensic analysis Switch The Reconnex iGuard Competitive Advantage • IP theft • Defensibility of Trade Secrets • Competitive Intelligence Critical Corporate Compliance Information Governance Security • • • “Insider” Threats SOX SB1386 • Workplace Safety • • Forensics GLBA • Appropriate Use of • • Social Engineering HIPAA Corporate Resources 05/02/06 Reconnex Confidential

Traditional Bottom UP Approach • Firewalls/antivir us • Network intrusion Communication detection/protec tion Protocols • Network flow tools Ports • limited session Bits reconstruction 05/02/06 Reconnex Confidential

The Bottom Up View: Bytes, Ports and Protocols 05/02/06 Reconnex Confidential

More Bottom Up 05/02/06 Reconnex Confidential

New Approach: Top Down WORD JPG GIF BMP TIFF C++ Objects, document & applications Communication Protocols Ports Bits 05/02/06 Reconnex Confidential

What Can You See? Over 150 content types Microsoft PowerPoint E-Mail Microsoft Excel Proprietary Schematics Format India Romania Source code Confidential Documents Offshore Development 05/02/06 Reconnex Confidential

Reconnex has the ONLY Solution That Addresses the Known and Unknown Threats The Reconnex iController Executive Team Finance Gigabit Databases The Reconnex Ethernet or Repositories Sales iManager Off-Shore Integration Points InfoSec/IT • SIM • Storage • AD/LDAP Switch • URL Filtering or Tap Signature • Web & Mail Proxies Match Rule “Reconnex’s forensics Match capabilities are a key piece of my compliance policy.” The Reconnex iGuard — Detect — Remediate Register — Report 05/02/06 Reconnex Confidential

Reconnex Surveillance Types • General Surveillance of all content, documents and communications • Document/Date/Time/Size/Watermarks/Sender/Recipient … • Targeted Surveillance, powered by Reconnex Document Registration • Exact or Generic Phrases/Individuals… • “A Unique Solution to the Problem of False Positives” • Can be operated on an ad hoc or scheduled basis CONFIDENTIAL - All Rights ReservedReconnex Confidential

What does Reconnex iGuard do? • Captures, classifies and stores in real time all content going in or out of a network • Alerts are generated for policy violations in real time • Allows for forensic searches over captured content for issues that you may become aware of in the future Gigabit network 05/02/06 Reconnex Confidential

The Reconnex Difference Real-Time End User Alerts Inbound capture(?) RCPE Network Traffic Rule Creator Outbound capture Content Historical Forensic Summarization Content Investigator Look Up Table (RFS) 05/02/06 Reconnex Confidential

Why don’t other products do this? !!Because it’s HARD!! Content Historical Summarization Content Look Up Table (RFS) Forensic Investigator 05/02/06 Reconnex Confidential

Easy to use Browser based access 05/02/06 Reconnex Confidential

Drill down to actual content 05/02/06 Reconnex Confidential

Moments of Revelation from “Top Down” Work with Reconnex CONFIDENTIAL - All Rights ReservedReconnex Confidential

www.reconnex.net 05/02/06 Reconnex Confidential

Add a comment

Related pages

Gigamon Ecosystem Partner Program - Network Visibility ...

... FireEye, and Gigamon show you how you can "See More. ... application analysis, forensics review and ... You have more control over your monitoring ...
Read more

Resources | Gigamon - Network Visibility, Analytics ...

... and Gigamon show you how you can "See More. Secure ... and Centralizes Network Performance Monitoring with Gigamon. ... Gigamon Traffic Analysis.
Read more

Gigamon Enables Threat Detection and Analysis at 100Gb ...

Gigamon Enables Threat Detection and Analysis at ... Security Monitoring Appliances, from Gigamon's ... content is expressly ...
Read more

Gigamon Appoints Scott Sullivan Vice President of ...

... company as Vice President of Worldwide Channel Sales bringing with him more ... at Gigamon, Sullivan will lead ... analysis, data forensics ...
Read more

Andrea Smith | LinkedIn

View Andrea Smith's professional profile on LinkedIn. ... alerting and visual forensics to identify when users are putting your ... See who you know in ...
Read more

Application & Server Log Monitoring, Correlation, & Alerting

Application & Server Log Monitoring, Correlation, & Alerting. You searched or ... real-time event correlation ; Perform forensic analysis on ... Content ...
Read more

Network tap - Wikipedia, the free encyclopedia

... a "network tap" may be the best way to accomplish this monitoring. The network ... network traffic analysis cannot ... because all you will see is ...
Read more

Log Management Software Tool, ArcSight Logger System | HP ...

HP ArcSight Logger is a log ... Built in rules and reports enable monitoring, alerting, and forensic ... Enterprise Content Management; File Analysis;
Read more