Security Weekly Podcasts

Identify and Resolve Security Threats
with High-Fidelity Wire Data

Today organizations have become increasingly reliant on AI and machine-learning tools in breach detection efforts, yet as evidenced by recent attacks, hackers are sophisticated enough to know how to fly under the radar. Once connected they can linger for long periods of time allowing them to extract the information they desire unnoticed. In order to stay a step ahead, IT needs to focus in on subtle network behaviors through proactive threat hunting and investigative approaches. 

SecOps & NetOps Team Up

Security teams could benefit from teaming up with their NetOps counterparts for shared data and to leverage insights from the team who is often first to observe subtle baseline deviations.

Listen and learn how VIAVI is addressing security incidents with proactive insight for real-time detection coupled with full-fidelity wire-data forensics for fast and complete incident response.

Enterprise Security Weekly: "Using the Network to Reduce Remediation Costs"

(25 minutes)

Many companies hire external consultants to conduct incident response and remediation, which can add up quickly in cost. In this video, Sid Nanda, Sr Solutions Marketing Manager at VIAVI Solutions, walks through how by providing these security consultants with network data in seconds instead of hours or days, we can drastically reduce remediation costs and speed breach containment.

Paul’s Security Weekly: "Collaboration Between NetOps and SecOps in Today's World"

(30 minutes)

Matt and the Security Weekly crew will discuss how the interaction between network engineers and security operations has changed over the years, as well as the value of the network when identifying security threats and performing remediation.

Security & Compliance Weekly Part 1: “A Network Security Perspective On Compliance Requirements”

(30 minutes)

In this video, Matt Allen, Sr Solutions Engineer from VIAVI Solutions talks with Jeff Mann and team from Security and Compliance Weekly on the value of adapting a holistic view to meet compliance requirements instead of “checking boxes.” They discuss the vendor eco-system feeding on checking boxes, ‘the human factor’, the need to invest in protect vs detect vs response tools and resources, and even the impact of remote working in the current climate.

Security & Compliance Weekly Part 2: “A Network Security Perspective On Compliance Requirements”

(30 minutes)

Matt walks through a demo of the VIAVI Observer GigaFlow and Apex platforms while speaking to the value of understanding packet and flow data. Matt and the hosts discuss how understanding Layer 2 and Layer 3 information is critical to identifying and investigating critical vulnerabilities. Finally, Matt explains VIAVI enriches traditional flow information by stitching together user identify, device and interface activity, and application usage details into interactive visualizations and how one can use this reporting to meet compliance requirements and other security use cases.

VISA Security Alerts - What We Can Learn & What We Can Do

(20 minutes)

On this episode of Enterprise Security Weekly, Paul Asadoorian and Matt Alderman interview Ward Cobleigh about the recent VISA security alerts highlighting the need for ongoing network monitoring and the ability to react quickly to specific indicators of compromise (IOCs). How flow and wire data can flag malicious behaviors and identify breach scope and impact.

Business Security Weekly: Bring NetOps into the Threat Hunt

(25 minutes)

In a very recent study, 65% of responding organizations reported a shortage of cybersecurity staff, with a lack of skilled or experienced security personnel their number one workplace concern (36%). To help fill this void, there is a very real and still growing need to cross-train existing professionals and teams whenever possible. How achievable is this goal? Can we really take the typical NetOps skillset, combine it with the data sources that are typically available to them, and apply this to the SecOps skills gap? This Business Security Week Podcast will answer these questions and include a demonstration of how a performance analysis platform can be used to quickly and efficiently identify threats.

Enterprise Security Weekly: Threat Detection - The Network Scavenger Hunt

(30 minutes)

There’s an abundance of potential data sources that can be found within your network. Where should you look? Which data sources offer unique perspectives and value? How can you use these data sources to speed threat identification, understand scope and impact, and aide in remediation steps to minimize impact? This segment includes a brief demonstration of how commonly available data sources can be effectively leveraged by SecOps and NetOps teams.

Enterprise Security Weekly: Threat Hunting

(30 minutes)

In this episode we dive into threat hunting techniques and how it can play a critical role in detection strategies - identifying subtle attacks that can subvert common AI and machine learning tools. Charles Thompson from VIAVI Solutions joins to discuss to talk about how to identify bad actors on your network, how to visualize what they are attempting to access, and who's communicating back.

Enterprise Security Weekly: Importance of Remediation

(40 minutes)

In this episode we dive into the recent high-profile network attacks that have the need for more robust network security strategies, specifically tools that analyze actual network conversations and monitor supporting infrastructure to strengthen existing threat prevention tools. 

Charles Thompson is the Senior Director of Product Management at VIAVI. Charles will discuss the importance of response and remediation in a strong security strategy and the role wire-data plays in having the forensic detail needed to identify a breach, understand scope of impact, and confirm restoration of network performance to pre-incident baseline. 

Security Weekly: Hack Naked News 

(23 minutes)

In today’s episode we get expert commentary from Charles Thompson, Senior Director of Product Management to talk about security investigations and forensics. The attackers must be right only once. It’s not a question of if a security vulnerability will hit an organization, but when. 

VIAVI has a substantial portfolio of products, but today’s episode focuses on the Observer family- including Apex, GigaStor, and GigaFlow - for NPM and security use cases. 

What can IT do to prepare themselves for the unexpected?

Security success that goes beyond preventative measures comes down to ensuring access, visualization, and understanding of complete wire-data across the enterprise. Yet only 7% of organizations are using both packet and flow-based datasets due to the complexity of effectively stitching the data together into a unified, high-value dataset.

VIAVI’s Observer platform is the bridge between NetOps and SecOps, providing a single unified data set that captures and stores the most robust wire data available for issue identification and remediation. This pure, unaltered packet and flow data is analyzed to present views across the entire IT landscape with simple end-user experience scoring as well as threat alert features. Teams can use automated workflows to dive into high-fidelity network evidence and solve the root-cause of the issue – minimizing impact on users and business operations. Request a demo today

Network Security Performance Graphic

Take a new approach to security with:

  • Advanced Traffic Profiling - identify anomalous activity and monitor acceptable use through traffic profiling of every host and device. Characterize traffic by type, usage, application, and communication activity. Profiles are maintained in real time and then stored with all future network traffic evaluated against past behavior.
  • Security Forensics and Reconstruction – Observer acts as an eyewitness to every network conversation, offering intuitive dashboards with summary information of every transaction over time. It also maintains ready access to individual packets for extended back-in-time investigations of suspicious activity. As a part of an investigation process, traffic can be quickly filtered and shared with third-party security and analysis tools. 
  • Global Threat ID with Scope and Impact - search by MAC address, IP address, subnet to quickly assess whether devices or applications are exhibiting aberrant behavior.