Network Security and Visibility through NetFlow

Join Richard Laval to discuss the security applications of NetFlow using Stealthwatch.

Network Security and Visibility through NetFlow

With the rise of disruptive forces such as cloud computing and mobile technology, the enterprise network has become larger and more complex than ever before. Meanwhile, sophisticated cyber-attackers are taking advantage of the expanded attack surface to gain access to internal networks and steal sensitive data.

Perimeter security is no longer enough to keep threat actors out, and organizations need to be able to detect and mitigate threats operating inside the network. NetFlow, a context-rich and common source of network traffic metadata, can be utilized for heightened visibility to identify attackers and accelerate incident response.

Join Richard Laval to discuss the security applications of NetFlow using Stealthwatch. This session will cover:

  • An overview of NetFlow, what it is, how it works, and how it benefits security
  • Design, deployment, and operational best practices for NetFlow security monitoring
  • How to best utilize NetFlow and identity services for security telemetry
  • How to investigate and identify threats using statistical analysis of NetFlow telemetry