Full Control Networks are hosting an educational event in a choice of 2 locations
Who’s connected to your network? And how do you manage their impact on your network?
Years ago only PCs and Servers had Ethernet ports - even laptops and printers needed special adaptors - so knowing what was connected to your network was fairly straight forward.
Today almost everything has either an Ethernet port or a wireless interface and demands an IP address in your network - keeping track is now very difficult. Much of this equipment goes untouched after installation (projectors, smart screens, door systems, CCTV etc) so knowledge, visibility and security of these devices aggravates the headache.
There are many technologies which can help you find out what's going on, but navigating the options can be tricky. In this workshop Full Control Networks (with support from a couple of industry experts) aims to introduce and discuss a number of different solutions, how they work and what value they bring in helping you monitor and control networked devices.
Logs or Syslogs – What can Logs tell us about our network?
Logs tell you about activity on the network, who’s opened a port, who’s trying to connect, who’s opening a file, who’s trying to get out into the big wide world. There are many different types of logs and LogPoint absorbs them all and turns the data into useable information on who’s doing what on your network.
Packets and Flows – Traffic solutions
When any device wants to do anything on the network, including logging in, there must be some sort of packet exchange. Even when devices are just switched on the act of DHCP or even checking for duplicate IPs on statically addressed devices means there are clues that something is out there. As devices attempt connections solutions from Allegro and Plixer see all the packets and flows illustrating patterns and activity which give away a device's presence and intentions.
Switch Forwarding tables - Use the Switches
When a device powers up, the switch port its connected to has to power up to allow any activity in or out. Even if the device has been configured to send nothing and just listen, the switch port has to become live for this to happen and that’s a detectable event. Portnox uses the switch forwarding tables to monitor everything connected to the network, no matter the traffic levels involved and then runs through a series of checks to identify the known from the unknown.
Protect the network from the things you can’t identify
When you find unidentified devices the typical response in the past has been to immediately block them. However, with so many devices requiring network access keeping abreast is a time-consuming business. Portnox has a flexible approach, limiting access rights for unknown devices who can still be on the network but moved into more secure VLANs.
Let users work in a protected environment
With new malware invented almost daily, can you be sure which are the real threats? Bromium allows full working environments connected to the network, but protects your network from compromise using micro VMs to hardware isolate – the user can carry on regardless and anything that tries to break out is destroyed.
Choice of 2 locations
Tues 9 July 2019 at Darrington Golf Club: WF8 3BP, A1/M62 junc – includes a basket of balls on the driving range!
Wed 10 July 2019 at Runway Visitor Park: Manchester, WA15 8XQ – includes a short tour aboard Concorde!
Details of the day
Time: 9am until 3pm
What’s included: Bacon butties on arrival, plenty of tea / coffee, lunch, car parking
The Extras: Depending on your chosen location, join us for a tour on Concorde or a stint at the driving range (balls/clubs included)
The cost: Nothing!
Places are limited, so email us now to book your place!