SlideShare a Scribd company logo
1 of 16
Ratinder Paul Singh Ahuja, Ph.D C.O.O & C.T.O
Reconnex performs content monitoring, alerting, and forensic analysis The Reconnex iGuard ,[object Object],[object Object],[object Object],Compliance ,[object Object],Switch ,[object Object],[object Object],Corporate Governance ,[object Object],[object Object],[object Object],Critical Information Security ,[object Object],[object Object],[object Object],Competitive Advantage
Traditional Bottom UP Approach ,[object Object],[object Object],[object Object],[object Object],Bits Ports Protocols Communication
The Bottom Up View: Bytes, Ports and Protocols
More Bottom Up
New Approach: Top Down Bits Ports Protocols Communication Objects, document  & applications WORD JPG GIF BMP TIFF C++
What Can You See? Over 150 content types E-Mail Microsoft Excel Confidential Documents Proprietary Format Microsoft PowerPoint Schematics Offshore Development India Romania Source code
Reconnex has the  ONLY Solution That Addresses the Known and  Unknown  Threats The Reconnex  iManager Register  —   Detect  —   Remediate  —   Report Gigabit Ethernet The Reconnex iGuard Executive Team Off-Shore InfoSec/IT Signature Match Finance Sales Databases  or Repositories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Reconnex  iController Rule  Match Switch or Tap “ Reconnex’s forensics capabilities are a key piece of my compliance policy.” 
Reconnex Surveillance Types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What does Reconnex iGuard do? ,[object Object],[object Object],[object Object],Gigabit network
The Reconnex Difference RCPE Network Traffic Rule  Creator Real-Time Alerts End User Historical  Content  (RFS) Content  Summarization  Look Up Table Inbound capture(?) Outbound capture Forensic Investigator
Why don’t other products do this? Historical  Content  (RFS) Content  Summarization  Look Up Table Forensic Investigator !!Because it’s HARD!!
Easy to use Browser based access
Drill down to actual content
Moments of Revelation from  “Top Down” Work with Reconnex
www.reconnex.net

More Related Content

What's hot

Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
alanrehbock
 
7.Trust Management
7.Trust Management7.Trust Management
7.Trust Management
phanleson
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
Ravindran Vasu
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
Ravindran Vasu
 

What's hot (20)

apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays LIVE New York 2021 - Securing access to high performing API in a regu...
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
 
Data security
Data securityData security
Data security
 
Secure Software Design for Data Privacy
Secure Software Design for Data PrivacySecure Software Design for Data Privacy
Secure Software Design for Data Privacy
 
A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)A New Security Paradigm for IoT (Internet of Threats)
A New Security Paradigm for IoT (Internet of Threats)
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
7.Trust Management
7.Trust Management7.Trust Management
7.Trust Management
 
In data security
In data securityIn data security
In data security
 
GitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial ServicesGitHub: Secure Software Development for Financial Services
GitHub: Secure Software Development for Financial Services
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014GTB Data Leakage Prevention Use Cases 2014
GTB Data Leakage Prevention Use Cases 2014
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
Data Security
Data SecurityData Security
Data Security
 
Securing Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and ChefSecuring Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and Chef
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 
Leveraging open banking specifications for rigorous API security – What’s in...
Leveraging open banking specifications for rigorous API security –  What’s in...Leveraging open banking specifications for rigorous API security –  What’s in...
Leveraging open banking specifications for rigorous API security – What’s in...
 
Unlock Security Insight from Machine Data
Unlock Security Insight from Machine DataUnlock Security Insight from Machine Data
Unlock Security Insight from Machine Data
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013GTB IRM - Business Use Cases - 2013
GTB IRM - Business Use Cases - 2013
 

Similar to Reconnex

Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
alex hincapie
 

Similar to Reconnex (20)

Threat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detectionThreat intel- -content-curation-organizing-the-path-to-successful-detection
Threat intel- -content-curation-organizing-the-path-to-successful-detection
 
IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!IOCs Are Dead—Long Live IOCs!
IOCs Are Dead—Long Live IOCs!
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Intellinx.z watch
Intellinx.z watchIntellinx.z watch
Intellinx.z watch
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
GDPR & Forensics Readiness -English
GDPR & Forensics Readiness -EnglishGDPR & Forensics Readiness -English
GDPR & Forensics Readiness -English
 
CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
dlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptxdlp-sales-play-sales-customer-deck-2022.pptx
dlp-sales-play-sales-customer-deck-2022.pptx
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 

More from gigamon

Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
gigamon
 

More from gigamon (17)

Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case StudyAlfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
Alfa Banking Group enhances Network Performance Monitoring| Gigamon Case Study
 
How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...How subscriber aware traffic processing yielded big savings for us wireless p...
How subscriber aware traffic processing yielded big savings for us wireless p...
 
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
40GB BiDirectional Passive TAP from Gigamon - G-TAP Product Brief
 
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product BriefAdvanced Network Traffic Intelligence with GigaSmart - Product Brief
Advanced Network Traffic Intelligence with GigaSmart - Product Brief
 
Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief Network Visibility Operating System Software - GigaVUE-OS Product Brief
Network Visibility Operating System Software - GigaVUE-OS Product Brief
 
Guardium
GuardiumGuardium
Guardium
 
Tealeaf
TealeafTealeaf
Tealeaf
 
Coradiant
CoradiantCoradiant
Coradiant
 
Network Instruments
Network InstrumentsNetwork Instruments
Network Instruments
 
WildPackets
WildPacketsWildPackets
WildPackets
 
FireEye
FireEyeFireEye
FireEye
 
Gigamon Systems
Gigamon SystemsGigamon Systems
Gigamon Systems
 
Network Critical
Network CriticalNetwork Critical
Network Critical
 
Solera Networks
Solera NetworksSolera Networks
Solera Networks
 
Network Physics
Network PhysicsNetwork Physics
Network Physics
 
Gigamon Systems Case Studies
Gigamon Systems Case StudiesGigamon Systems Case Studies
Gigamon Systems Case Studies
 
Gigamon Systems Hardware Tour
Gigamon Systems Hardware TourGigamon Systems Hardware Tour
Gigamon Systems Hardware Tour
 

Recently uploaded

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 

Recently uploaded (20)

Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 

Reconnex

  • 1. Ratinder Paul Singh Ahuja, Ph.D C.O.O & C.T.O
  • 2.
  • 3.
  • 4. The Bottom Up View: Bytes, Ports and Protocols
  • 6. New Approach: Top Down Bits Ports Protocols Communication Objects, document & applications WORD JPG GIF BMP TIFF C++
  • 7. What Can You See? Over 150 content types E-Mail Microsoft Excel Confidential Documents Proprietary Format Microsoft PowerPoint Schematics Offshore Development India Romania Source code
  • 8.
  • 9.
  • 10.
  • 11. The Reconnex Difference RCPE Network Traffic Rule Creator Real-Time Alerts End User Historical Content (RFS) Content Summarization Look Up Table Inbound capture(?) Outbound capture Forensic Investigator
  • 12. Why don’t other products do this? Historical Content (RFS) Content Summarization Look Up Table Forensic Investigator !!Because it’s HARD!!
  • 13. Easy to use Browser based access
  • 14. Drill down to actual content
  • 15. Moments of Revelation from “Top Down” Work with Reconnex