DPI-digest: information security, virtualization and regulation
In the 5th thematic digest we will talk about network technologies, we will provide basic analytics on information security and materials in the wake of innovations of legislators.
Acquaintance with the main difficulties in working with Network Functions Virtualization and virtual network nodes. We look at the architecture, work with outdated networks, security problems and the situation with standards and practical cases.
Virtual Private LAN Service is one of the most flexible tools for accessing servers located in data centers. Here we give a small tutorial on how to connect, talk about the features of VPLS and the benefits of virtualization.
As Bypass technology allows you to pass traffic from port to port, bypassing the controller, even when the power of the network card is off. Let's talk about where I use boards with a Bypass mode, what is on the market and how to make a choice.
We talk about the advantages of a convergent infrastructure, give examples of popular convergent systems and draw parallels with the SCAT DPI traffic monitoring and analysis system.
We talk about the "study" of the victim, establishing control, organizing access and other stages of attacks. In addition, we briefly stop on security measures.
We understand what is within the competence of an IT security engineer. And we briefly dwell on what is needed to start a career path in this field of activity.
We give examples of corporate password managers and write about setting up automatic access to devices without entering a password, one-time passwords and an alert system when accessing a password.
We are talking about the basic methods of blocking: by IP-address, by SNI and by certificate. We analyze the example of the corresponding MITM-attack and emphasize the illegality of such actions.
We consider innovation in the context of modern warning systems, international experience and briefly discuss how providers can implement emergency messaging.
What is included in the list of requirements for implementing the SORM-3 system is looking at this task from the point of view of the customer and the contractor.
We consider the “Spring package”, basic requirements and fines. In addition, we are talking about how to mitigate the negative effects of this innovation.
Today (September 28, 2017) at 11-00 am Moscow time, VAS Experts will hold a webinar on SORM-3 and traffic filtering. We will talk about practical cases, scenarios, features, differences and different nuances of SORM-1, SORM-2, SORM-3 implementation.
We talk about our participation in the 7th annual meeting of the members of the ASIA 2017 GCCM Club. At GCCM, our company presented the product SCAT DPI.
The leading software engineer of our company and one of the experts of the development team of the SCAT DPI in-depth traffic analysis platform tells about himself, the applied aspects of work activities and personal interests.