NetOps and SecOps in the Data plane

Posted by MantisNet on Jan 15, 2019 11:35:14 AM

We had the pleasure of supporting the Software Engineering Institute at Carnegie Mellon University’s conference, FloCon: Using Data to Defend. The presentations and discussions at the event provided validation that changes are coming to network and cyber security. More mathematical solutions are being developed to fuel machine learning and algorithms to combat malicious and other network traffic of interest. If you missed the event, an overview and video of our presentation is below.

Read More

Tags: mantis, Data-In-Motion, DNS Monitoring, network engineering, Real-Time Monitoring

The Biggest Dilemma CIOs are Facing Heading Into 2019

Posted by Peter Dougherty on Nov 14, 2018 6:06:54 PM

2019 is right around the corner, and CIOs are prepping for the new year. Specifically, CIOs are making plans as it relates to cybersecurity and data privacy management. Grappling with how to make informed business decisions with real-time technologies, increasing the use of orchestration and automation along with continuous monitoring, to enable real-time detection, decisioning and remediation.

Read More

FloCon 2019 and MantisNet

Posted by MantisNet on Nov 8, 2018 3:04:54 PM

MantisNet is a proud sponsor and participant at the upcoming FloCon 2019 conference in New Orleans, January 7-10, 2019.

We were excited to be accepted as a speaker and sponsor for the annual Software Engineering Institute at Carnegie Mellon University’s event. The theme for FloCon 2019 is ‘Using Data to Defend’ and the forum to “explore large-scale, next-generation data analytics in support of security operations” fits squarely within the core mission and vision of MantisNet.

Read More

Tags: mantis, Real-Time Monitoring

The Ultimate Cyber Security Strategy: Is Data-in-Motion The Answer?

Posted by MantisNet on Jul 25, 2018 4:02:42 PM

Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems. 

Read More

Tags: Real-Time Monitoring, Data-In-Motion, Data-at-Rest, cyber security

Cyber Security Strategies that Make Data-at-Rest Obsolete

Posted by MantisNet on May 22, 2018 4:06:43 PM

The world of cyber security is complex and misunderstood by a majority of the public. 

Read More

Tags: Data-at-Rest, cyber security

The Latest Verizon Data Breach Report: Your Data is Gone Within Minutes

Posted by MantisNet on Apr 27, 2018 2:02:51 PM

Verizon released its latest Data Breach Investigation Report (DBIR) highlighting the latest trends in malware and cyber crime, covering 53,000 incidents and 2,216 confirmed breaches. The report reveals that botnets are the most widespread, dangerous attacks to date. The number of botnet attacks reported was so numerous that all 43,000 breaches (mainly on financial data) were excluded from overall statistics and given a separate section of its own. With botnet breaches on the rise, Verizon's report confirms that monitoring network traffic is more important than ever.

Read More

Tags: cyber security, Real-Time Monitoring

Continuous DNS Monitoring: A Real-Time Building Block for SOC Analysts

Posted by MantisNet on Apr 10, 2018 1:00:06 PM

Utilize Real-Time Monitoring to Protect Your Network

With billions of websites on the Internet, separating the good from the bad is nearly impossible for your IT team.  However, by combining specific tools with streaming analytics, you can better secure and harden your network into a real-time, dynamic cyber security system that identifies potential attacks and blocks them during initial DNS exchanges - effectively stopping security breaches before they have the potential to reach your users.

Read More

Tags: DNS Monitoring, Real-Time Monitoring

Identify and Defend Against Credential Stuffing and ATO Attacks

Posted by MantisNet on Mar 26, 2018 8:07:42 PM

How to Defend Against Credential Stuffing and Account Takeover Attacks

Cyber-crime is no longer a single attacker hacking away at your defenses. With automated credential stealing and account takeover tools, an attacker can send armies of bots to steal valuable information from thousands of victims and make hundreds of thousands of financial transactions.

Read More

Tags: cyber security, ATO Attacks, Account Takeover

100G Load Balancing: A Crash Course

Posted by MantisNet on Feb 14, 2018 11:58:30 AM

What is 100G Load Balancing?

As organizations continue to transition to high-speed network infrastructure, engineers responsible for network monitoring find themselves in need of an answer to the question, "How does one go about monitoring 100G network links?" The unique characteristics of high-speed networks make this a serious technical challenge. 

Read More

100G Network Monitoring: The High-Speed Dilemma

Posted by MantisNet on Dec 14, 2017 9:36:34 AM

100G Networking Trends

2017 proved to be an explosive year for 100G, as well as for other "high-speed" networking technologies ("high-speed" being anything 25G+). According to Crehan Research, the data center Ethernet switching market saw its strongest growth in five years during 2017.

Read More

Tags: network engineering