Cyber Range Advanced Training

March 22nd, 2017|Comments Off on Cyber Range Advanced Training

This course will give participants an understanding of offensive and defensive cyber security methods. They will gain knowledge and skills in reacting to a myriad of cyber security and application traffic flows. Participants will be […]

3 Problems with using Port Numbers for ID Applications

January 16th, 2017|Comments Off on 3 Problems with using Port Numbers for ID Applications

When identifying applications using port number is not the best way anymore. Many applications use port 80 and 443, the problem is when you associate port numbers with applications, you are open to send the […]

How to Identify What Applications are on your network

January 15th, 2017|0 Comments

Deep packet inspection can be performed by devices that read the payload of packets within network traffic flows. These devices can decode applications and let the user know which type of applications are being used […]

Validate IT Success, Optimize Performance

May 27th, 2016|0 Comments

Did you know that critical business processes are supported at every point by the IT Infrastructure. Failure of this infrastructure is an option and will lead in loss of data and investments

Viavi Solutions Observer Platform […]

Site Surveys Worth it?

October 8th, 2015|0 Comments

Site surveys for surveillance applications, are they needed, are they worth it?

Many wonder whether the promises and benefits of wireless technologies can be succesfully implemented for a surveillance camera network. The answer is a convincing: […]