Cyber Range Advanced Training
This course will give participants an understanding of offensive and defensive cyber security methods. They will gain knowledge and skills in reacting to a myriad of cyber security and application traffic flows. Participants will be […]
3 Problems with using Port Numbers for ID Applications
When identifying applications using port number is not the best way anymore. Many applications use port 80 and 443, the problem is when you associate port numbers with applications, you are open to send the […]
How to Identify What Applications are on your network
Deep packet inspection can be performed by devices that read the payload of packets within network traffic flows. These devices can decode applications and let the user know which type of applications are being used […]
Validate IT Success, Optimize Performance
Did you know that critical business processes are supported at every point by the IT Infrastructure. Failure of this infrastructure is an option and will lead in loss of data and investments
Viavi Solutions Observer Platform […]
Site Surveys Worth it?
Site surveys for surveillance applications, are they needed, are they worth it?
Many wonder whether the promises and benefits of wireless technologies can be succesfully implemented for a surveillance camera network. The answer is a convincing: […]