Watch this short security webinar to learn more about the
the impact of BYOD (bring your own device), how traffic inspection is more than just the application and listen to
real word case study examples such as how datasheet performance claims stand up against the reality and how specific security protocols impact performance
3. What are IT Departments Asking for…
PROPRIETARY AND CONFIDENTIAL
4. Understanding Malware
Short for Malicious Software
Represents hostile software used to
• Disrupt computer operation
• Gather sensitive information
• Gain access to private computer systems
Common malware types:
•
•
•
•
Adware
Keyloggers
Ransomware
Rootkits
•
•
•
•
MALWARE INFECTIONS BY TYPE IN 2012
Spyware
Trojan Horses
Viruses
Worms
Source: PandaLabs Annual Report for 2012 by Panda Security
PROPRIETARY AND CONFIDENTIAL
5. Malware Testing
Infected host
emulation
Binary transfer
emulation
• Test security counter
measures and policies for
detecting spreading
malware
• Test inline or antivirus
detection effectiveness
Malware testing • Test the effectiveness and
accuracy of your security
under
devices and policies under
application load real work load
PROPRIETARY AND CONFIDENTIAL
6. Summary
BYOD adds complexity with number
of devices, endpoints and versions
of apps on your network
Security infrastructure testing is no
longer legacy firewall testing, but
more involved with multiple
vectors
Realistic emulation critical to
understand actual impact
www.spirent.com
PROPRIETARY AND CONFIDENTIAL
7. To listen to the full webinar visit:
http://www.spirent.com/OnDemand/Networks_and_
Applications/DPI_Testing
PROPRIETARY AND CONFIDENTIAL
Notes de l'éditeur
Apps are exploding – over 1 M apps just on Facebook, App Store and Android. In June Android apps are expected to exceed App Store Smartphone usage is shooting up – close to 500 M last year. According to Mobilefuture.org, by 2012 it will exceed combined sales of PC and laptops. According to ATT report, Smartphones account for 30X the bandwidth and the price increase is around 3X. Http is the new tcp. Apps are moving to the cloud and everything –from consumer to business apps and everything in between are accessed over the webAll this is putting intense pressure on all parts of the ecosystem.
Adware – While some forms of adware may be considered legitimate, others make unauthorized access to computer systems and greatly disrupt users.Keyloggers – Typically done in a covert manner, keyloggers track the keys struck on a keyboard and may capture passwords or credit card numbers.Ransomware – After establishing itself on a computer system, ransomware restricts access to the system and demands a ransom be paid to remove it.Rootkits – This type of malware gains privileged access to computer systems and hides itself from normal methods of detection.Spyware – Spyware observes the activities of computer users without their consent and reports it to the software's author or other entity.Trojan Horses – A Trojan Horse initially appears to perform a desirable function and then facilitates unauthorized access to the computer system.Viruses – A computer virus typically attaches itself to an executable file so it can perform malicious activities and replicate itself on other systems.Worms – A worm is a standalone piece of software that, like a virus, can perform malicious activities and replicate itself on other systems.