The Ultimate Cyber Security Strategy: Is Data-in-Motion The Answer?

Posted by MantisNet on Jul 25, 2018 4:02:42 PM

Before we can address the optimum method for responding to the continuously evolving cyber threat landscape, we need to understand the sources and types of data available from which we can understand and make decisions about the health and security of our systems. 

Read More

Tags: cyber security, Real-Time Monitoring, Data-at-Rest, Data-In-Motion

Cyber Security Strategies that Make Data-at-Rest Obsolete

Posted by MantisNet on May 22, 2018 4:06:43 PM

The world of cyber security is complex and misunderstood by a majority of the public. Even in IT, few people understand the complexities of a sophisticated cyber attack. It's this lack of understanding and the low number of experts in the field that give cyber attackers an advantage.

Read More

Tags: cyber security, Data-at-Rest

The Latest Verizon Data Breach Report: Your Data is Gone Within Minutes

Posted by MantisNet on Apr 27, 2018 2:02:51 PM

Verizon released its latest Data Breach Investigation Report (DBIR) highlighting the latest trends in malware and cyber crime, covering 53,000 incidents and 2,216 confirmed breaches. The report reveals that botnets are the most widespread, dangerous attacks to date. The number of botnet attacks reported was so numerous that all 43,000 breaches (mainly on financial data) were excluded from overall statistics and given a separate section of its own. With botnet breaches on the rise, Verizon's report confirms that monitoring network traffic is more important than ever.

Read More

Tags: cyber security, Real-Time Monitoring

Continuous DNS Monitoring: A Real-Time Building Block for SOC Analysts

Posted by MantisNet on Apr 10, 2018 1:00:06 PM

Utilize Real-Time Monitoring to Protect Your Network

With billions of websites on the Internet, separating the good from the bad is nearly impossible for your IT team.  However, by combining specific tools with streaming analytics, you can better secure and harden your network into a real-time, dynamic cyber security system that identifies potential attacks and blocks them during initial DNS exchanges - effectively stopping security breaches before they have the potential to reach your users.

Read More

Tags: Real-Time Monitoring, DNS Monitoring

Identify and Defend Against Credential Stuffing and ATO Attacks

Posted by MantisNet on Mar 26, 2018 8:07:42 PM

How to Defend Against Credential Stuffing and Account Takeover Attacks

Cyber-crime is no longer a single attacker hacking away at your defenses. With automated credential stealing and account takeover tools, an attacker can send armies of bots to steal valuable information from thousands of victims and make hundreds of thousands of financial transactions.

Read More

Tags: cyber security, Account Takeover, ATO Attacks

100G Load Balancing: A Crash Course

Posted by MantisNet on Feb 14, 2018 11:58:30 AM

What is 100G Load Balancing?

As organizations continue to transition to high-speed network infrastructure, engineers responsible for network monitoring find themselves in need of an answer to the question, "How does one go about monitoring 100G network links?" The unique characteristics of high-speed networks make this a serious technical challenge. 

Read More

100G Network Monitoring: The High-Speed Dilemma

Posted by MantisNet on Dec 14, 2017 9:36:34 AM

100G Networking Trends

2017 proved to be an explosive year for 100G, as well as for other "high-speed" networking technologies ("high-speed" being anything 25G+). According to Crehan Research, the data center Ethernet switching market saw its strongest growth in five years during 2017.

Read More

Tags: network engineering

Network Monitoring Step 2: The Next-Generation of Packet Brokers

Posted by MantisNet on Nov 9, 2017 9:40:10 AM

The MantisNet Reconfigurable Frame Processor

A new class of highly intelligent Virtual Switches and Next-Generation Packet Brokers (NPB) is on the rise.

Read More

Tags: network engineering, network preformance, cyber security

Network Monitoring Step 1 SPAN ports vs. TAPs

Posted by MantisNet on Oct 4, 2017 7:17:07 PM

What Is The Difference Between SPAN Ports Vs. TAPS?

While deploying network monitoring tools, IT managers are often faced with questions, such as: "Can we do this and still ensure that we aren't impacting the production network?" or "Can I make sure that I can see 100% of network traffic?" or "What is the best way to get data into my monitoring and test tools?" 

Read More

Tags: network engineering, test/lab automation, network preformance, cyber security, IT operations