SlideShare a Scribd company logo
1 of 16
Download to read offline
Ratinder Paul Singh Ahuja, Ph.D
                                        C.O.O & C.T.O




05/02/06        Reconnex Confidential
Reconnex performs content monitoring, alerting, and
forensic analysis


                                      Switch


                                                    The Reconnex
                                                       iGuard


                                                                               Competitive
                                                                               Advantage
                                                                          •   IP theft
                                                                          •   Defensibility of Trade Secrets
                                                                          •   Competitive Intelligence



                                                                                Critical
                                                Corporate
                 Compliance                                                   Information
                                               Governance                       Security
                                                                          •
             •           •                                                    “Insider” Threats
                 SOX         SB1386       •    Workplace Safety
                                                                          •
             •                                                                Forensics
                 GLBA                     •    Appropriate Use of
                                                                          •
             •                                                                Social Engineering
                 HIPAA                         Corporate Resources
  05/02/06                                        Reconnex Confidential
Traditional Bottom UP Approach



            • Firewalls/antivir
              us
            • Network
              intrusion
                                                          Communication
              detection/protec
              tion
                                                            Protocols
            • Network flow
              tools
                                                              Ports
            • limited
              session                                         Bits
              reconstruction



 05/02/06                         Reconnex Confidential
The Bottom Up View:
Bytes, Ports and Protocols




 05/02/06          Reconnex Confidential
More Bottom Up




 05/02/06        Reconnex Confidential
New Approach: Top Down



                  WORD      JPG      GIF   BMP   TIFF   C++


                       Objects, document
                         & applications

                   Communication

                        Protocols

                           Ports

                            Bits



 05/02/06        Reconnex Confidential
What Can You See? Over 150 content
      types

                                     Microsoft PowerPoint
              E-Mail                                                    Microsoft Excel




                                                                            Proprietary
           Schematics                                                         Format




                             India   Romania

                                Source
                                 code




                                                         Confidential
                                                         Documents
                        Offshore Development

05/02/06                             Reconnex Confidential
Reconnex has the ONLY Solution That
Addresses the Known and Unknown Threats
                                         The Reconnex
                                          iController
                   Executive Team


                                   Finance

Gigabit
                                                         Databases
                                                                                        The Reconnex
Ethernet
                                                         or Repositories
                                                 Sales                                    iManager

                                                          Off-Shore


                                                                                                 Integration Points
                                                                           InfoSec/IT            • SIM
                                                                                                 • Storage
                                                                                                 • AD/LDAP
                  Switch
                                                                                                 • URL Filtering
                  or Tap             Signature                                                   • Web & Mail Proxies
                                       Match
                           Rule
                                                                             “Reconnex’s forensics
                           Match

                                                                           capabilities are a key piece
                                                                           of my compliance policy.”
                                   The Reconnex
                                      iGuard



                                                 — Detect       — Remediate
                                   Register                                                — Report

       05/02/06                                                 Reconnex Confidential
Reconnex Surveillance Types

• General Surveillance of all content, documents
  and communications
      • Document/Date/Time/Size/Watermarks/Sender/Recipient
        …

• Targeted Surveillance, powered by Reconnex
  Document Registration
      • Exact or Generic Phrases/Individuals…
      • “A Unique Solution to the Problem of False Positives”

• Can be operated on an ad hoc or
  scheduled basis



                                  CONFIDENTIAL - All Rights
                                ReservedReconnex Confidential
What does Reconnex iGuard do?

• Captures, classifies and stores in real time all content going in or
     out of a network
• Alerts are generated for policy violations in real time
• Allows for forensic searches over captured content for issues that
     you may become aware of in the future




                Gigabit network




05/02/06                           Reconnex Confidential
The Reconnex Difference



                                   Real-Time                End User
                                     Alerts

           Inbound capture(?)

                                 RCPE
       Network Traffic                                         Rule
                                                              Creator
           Outbound capture



                 Content                     Historical     Forensic
                 Summarization               Content
                                                          Investigator
                 Look Up Table               (RFS)




05/02/06                          Reconnex Confidential
Why don’t other products do this?


               !!Because it’s HARD!!

              Content                       Historical
              Summarization                 Content
              Look Up Table                 (RFS)




                                                           Forensic
                                                         Investigator



05/02/06                      Reconnex Confidential
Easy to use Browser based access




05/02/06                 Reconnex Confidential
Drill down to actual content




05/02/06                   Reconnex Confidential
Moments of Revelation from
“Top Down” Work with Reconnex




                   CONFIDENTIAL - All Rights
                 ReservedReconnex Confidential
www.reconnex.net




05/02/06       Reconnex Confidential

More Related Content

What's hot

OpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoOpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoADVA
 
Dimension Data Managed Services for IPT
Dimension Data Managed Services for IPTDimension Data Managed Services for IPT
Dimension Data Managed Services for IPTJaskarnr
 
Wireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media NetworksWireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media NetworksCisco Mobility
 
SANA Shamus-new CV
SANA Shamus-new CVSANA Shamus-new CV
SANA Shamus-new CVsana shamus
 
PRESENTACION FINAL Nicaragua
PRESENTACION FINAL NicaraguaPRESENTACION FINAL Nicaragua
PRESENTACION FINAL Nicaraguaenriquebio2
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVAndrew Tram
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Ingenious Services Group, Llc 2012 Service Offerings Detail
Ingenious Services Group, Llc   2012 Service Offerings DetailIngenious Services Group, Llc   2012 Service Offerings Detail
Ingenious Services Group, Llc 2012 Service Offerings Detailtimothydreher
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Michael Graves
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesCisco Mobility
 
Microsoft Lync & Acme Packet Session Management Solutions
Microsoft Lync & Acme Packet Session Management SolutionsMicrosoft Lync & Acme Packet Session Management Solutions
Microsoft Lync & Acme Packet Session Management SolutionsMUCUGL
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureCisco Mobility
 
2012 Kaba Saflok Brochure
2012 Kaba Saflok Brochure2012 Kaba Saflok Brochure
2012 Kaba Saflok BrochureKaba
 

What's hot (18)

OpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP ExpoOpenFlow Beyond the Data Centre at IP Expo
OpenFlow Beyond the Data Centre at IP Expo
 
Dimension Data Managed Services for IPT
Dimension Data Managed Services for IPTDimension Data Managed Services for IPT
Dimension Data Managed Services for IPT
 
Wireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media NetworksWireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media Networks
 
SANA Shamus-new CV
SANA Shamus-new CVSANA Shamus-new CV
SANA Shamus-new CV
 
PRESENTACION FINAL Nicaragua
PRESENTACION FINAL NicaraguaPRESENTACION FINAL Nicaragua
PRESENTACION FINAL Nicaragua
 
PathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TVPathTrak™ Video Monitoring System for Cable TV
PathTrak™ Video Monitoring System for Cable TV
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Ingenious Services Group, Llc 2012 Service Offerings Detail
Ingenious Services Group, Llc   2012 Service Offerings DetailIngenious Services Group, Llc   2012 Service Offerings Detail
Ingenious Services Group, Llc 2012 Service Offerings Detail
 
Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010Acme Packet Presentation Materials for VUC June 18th 2010
Acme Packet Presentation Materials for VUC June 18th 2010
 
V I D E O
V I D E OV I D E O
V I D E O
 
Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4Ap 622 ss 0112_chv4
Ap 622 ss 0112_chv4
 
Ims Services
Ims ServicesIms Services
Ims Services
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
 
Microsoft Lync & Acme Packet Session Management Solutions
Microsoft Lync & Acme Packet Session Management SolutionsMicrosoft Lync & Acme Packet Session Management Solutions
Microsoft Lync & Acme Packet Session Management Solutions
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
CV-ROB
CV-ROBCV-ROB
CV-ROB
 
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
 
2012 Kaba Saflok Brochure
2012 Kaba Saflok Brochure2012 Kaba Saflok Brochure
2012 Kaba Saflok Brochure
 

Viewers also liked

Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGrant Swanson
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersSavvius, Inc
 
Forensic Services Leaflet V3(1)
Forensic Services Leaflet V3(1)Forensic Services Leaflet V3(1)
Forensic Services Leaflet V3(1)bbandydavies
 
Photograph Analysis
Photograph AnalysisPhotograph Analysis
Photograph Analysis07wilsk
 
Foundation portfolio photograph analysis
Foundation portfolio photograph analysisFoundation portfolio photograph analysis
Foundation portfolio photograph analysisAmortimer
 
Music Photograph Analysis
Music Photograph AnalysisMusic Photograph Analysis
Music Photograph AnalysisJack Dixon
 
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...Sandra Schön (aka Schoen)
 
Photograph analysis
Photograph analysisPhotograph analysis
Photograph analysisCorySmith25
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamiaemedu
 

Viewers also liked (9)

Gigamon U - Web Performance Monitoring
Gigamon U - Web Performance MonitoringGigamon U - Web Performance Monitoring
Gigamon U - Web Performance Monitoring
 
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the AnswersYou Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
You Suspect a Security Breach. Network Forensic Analysis Gives You the Answers
 
Forensic Services Leaflet V3(1)
Forensic Services Leaflet V3(1)Forensic Services Leaflet V3(1)
Forensic Services Leaflet V3(1)
 
Photograph Analysis
Photograph AnalysisPhotograph Analysis
Photograph Analysis
 
Foundation portfolio photograph analysis
Foundation portfolio photograph analysisFoundation portfolio photograph analysis
Foundation portfolio photograph analysis
 
Music Photograph Analysis
Music Photograph AnalysisMusic Photograph Analysis
Music Photograph Analysis
 
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...
Schaffert/Hilzensauer:nderlying Concepts and Theories of Learning with the Se...
 
Photograph analysis
Photograph analysisPhotograph analysis
Photograph analysis
 
Signature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beamSignature analysis of cracked cantilever beam
Signature analysis of cracked cantilever beam
 

Similar to Ratinder Paul Singh Ahuja Ph.D C.O.O & C.T.O Reconnex presentation

RPI Areas of Specialisation
RPI Areas of SpecialisationRPI Areas of Specialisation
RPI Areas of Specialisationwillselby
 
InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalRob Marano
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1bSOA Symposium
 
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value Splunk
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documentslegalinfo
 
InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionSimon Perry
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 
Disaster Solutions 2.0
Disaster Solutions 2.0Disaster Solutions 2.0
Disaster Solutions 2.0ferryheeneman
 
How We Can Help
How We Can HelpHow We Can Help
How We Can HelpDavid Rice
 
Right Space Brief
Right Space BriefRight Space Brief
Right Space Briefjnassour
 
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...Alfresco Software
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceAndris Soroka
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Rob Robinson
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationCDB Consultancy LLC
 
Segundo Semario de SharePoint en Mexico por Joel Oleson
Segundo Semario de SharePoint en Mexico por Joel OlesonSegundo Semario de SharePoint en Mexico por Joel Oleson
Segundo Semario de SharePoint en Mexico por Joel OlesonJoel Oleson
 

Similar to Ratinder Paul Singh Ahuja Ph.D C.O.O & C.T.O Reconnex presentation (20)

RPI Areas of Specialisation
RPI Areas of SpecialisationRPI Areas of Specialisation
RPI Areas of Specialisation
 
InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation Final
 
Dharmes Mistry Tony De Bree S O A Business Persp V1b
Dharmes  Mistry    Tony De  Bree   S O A Business Persp V1bDharmes  Mistry    Tony De  Bree   S O A Business Persp V1b
Dharmes Mistry Tony De Bree S O A Business Persp V1b
 
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
SplunkLive: New Visibility=New Opportunity: How IT Can Drive Business Value
 
Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)Fast Pitch Forum (VANTOS)
Fast Pitch Forum (VANTOS)
 
Numerals In Legal Or Financial Documents
Numerals In Legal Or Financial DocumentsNumerals In Legal Or Financial Documents
Numerals In Legal Or Financial Documents
 
InfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss PreventionInfoSecurity Magazine - Data Loss Prevention
InfoSecurity Magazine - Data Loss Prevention
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Disaster Solutions 2.0
Disaster Solutions 2.0Disaster Solutions 2.0
Disaster Solutions 2.0
 
How We Can Help
How We Can HelpHow We Can Help
How We Can Help
 
Right Space Brief
Right Space BriefRight Space Brief
Right Space Brief
 
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...
Partner Solution: CIGNEX DATAMATICS - Integration of Alfresco ECM & Liferay t...
 
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems IntelligenceDSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
DSS ITSEC Conference 2012 - SIEM Q1 Labs IBM Security Systems Intelligence
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
 
On Demand BI
On Demand BIOn Demand BI
On Demand BI
 
Copyright in the Clouds
Copyright in the CloudsCopyright in the Clouds
Copyright in the Clouds
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
 
Segundo Semario de SharePoint en Mexico por Joel Oleson
Segundo Semario de SharePoint en Mexico por Joel OlesonSegundo Semario de SharePoint en Mexico por Joel Oleson
Segundo Semario de SharePoint en Mexico por Joel Oleson
 
Sce Partners Overview
Sce Partners OverviewSce Partners Overview
Sce Partners Overview
 

More from Grant Swanson

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Grant Swanson
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGrant Swanson
 
Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGrant Swanson
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Grant Swanson
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGrant Swanson
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGrant Swanson
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Grant Swanson
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGrant Swanson
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingGrant Swanson
 

More from Grant Swanson (9)

Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
Gigamon Ensures Privacy of Data in Multi-tenant Network and Enables Near Real...
 
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified CompanyGigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
Gigamon Enables Cost-effective Monitoring Solution for Large Diversified Company
 
Gigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis ArchitectureGigamon U - Network Rules, Distributed Network Analysis Architecture
Gigamon U - Network Rules, Distributed Network Analysis Architecture
 
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
Gigamon U - Net Scouts Honor, Integrated Performance Monitoring & Forensic An...
 
Gigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control SystemGigamon U - Eye Of The Fire, Network Malware Control System
Gigamon U - Eye Of The Fire, Network Malware Control System
 
Gigamon U - Packets Gone Wild
Gigamon U - Packets Gone WildGigamon U - Packets Gone Wild
Gigamon U - Packets Gone Wild
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback AppliancesGigamonU - Solera Blend Riches, Packet Record and Playback Appliances
GigamonU - Solera Blend Riches, Packet Record and Playback Appliances
 
Data Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and TroubleshootingData Access Network for Monitoring and Troubleshooting
Data Access Network for Monitoring and Troubleshooting
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 

Ratinder Paul Singh Ahuja Ph.D C.O.O & C.T.O Reconnex presentation

  • 1. Ratinder Paul Singh Ahuja, Ph.D C.O.O & C.T.O 05/02/06 Reconnex Confidential
  • 2. Reconnex performs content monitoring, alerting, and forensic analysis Switch The Reconnex iGuard Competitive Advantage • IP theft • Defensibility of Trade Secrets • Competitive Intelligence Critical Corporate Compliance Information Governance Security • • • “Insider” Threats SOX SB1386 • Workplace Safety • • Forensics GLBA • Appropriate Use of • • Social Engineering HIPAA Corporate Resources 05/02/06 Reconnex Confidential
  • 3. Traditional Bottom UP Approach • Firewalls/antivir us • Network intrusion Communication detection/protec tion Protocols • Network flow tools Ports • limited session Bits reconstruction 05/02/06 Reconnex Confidential
  • 4. The Bottom Up View: Bytes, Ports and Protocols 05/02/06 Reconnex Confidential
  • 5. More Bottom Up 05/02/06 Reconnex Confidential
  • 6. New Approach: Top Down WORD JPG GIF BMP TIFF C++ Objects, document & applications Communication Protocols Ports Bits 05/02/06 Reconnex Confidential
  • 7. What Can You See? Over 150 content types Microsoft PowerPoint E-Mail Microsoft Excel Proprietary Schematics Format India Romania Source code Confidential Documents Offshore Development 05/02/06 Reconnex Confidential
  • 8. Reconnex has the ONLY Solution That Addresses the Known and Unknown Threats The Reconnex iController Executive Team Finance Gigabit Databases The Reconnex Ethernet or Repositories Sales iManager Off-Shore Integration Points InfoSec/IT • SIM • Storage • AD/LDAP Switch • URL Filtering or Tap Signature • Web & Mail Proxies Match Rule “Reconnex’s forensics Match capabilities are a key piece of my compliance policy.” The Reconnex iGuard — Detect — Remediate Register — Report 05/02/06 Reconnex Confidential
  • 9. Reconnex Surveillance Types • General Surveillance of all content, documents and communications • Document/Date/Time/Size/Watermarks/Sender/Recipient … • Targeted Surveillance, powered by Reconnex Document Registration • Exact or Generic Phrases/Individuals… • “A Unique Solution to the Problem of False Positives” • Can be operated on an ad hoc or scheduled basis CONFIDENTIAL - All Rights ReservedReconnex Confidential
  • 10. What does Reconnex iGuard do? • Captures, classifies and stores in real time all content going in or out of a network • Alerts are generated for policy violations in real time • Allows for forensic searches over captured content for issues that you may become aware of in the future Gigabit network 05/02/06 Reconnex Confidential
  • 11. The Reconnex Difference Real-Time End User Alerts Inbound capture(?) RCPE Network Traffic Rule Creator Outbound capture Content Historical Forensic Summarization Content Investigator Look Up Table (RFS) 05/02/06 Reconnex Confidential
  • 12. Why don’t other products do this? !!Because it’s HARD!! Content Historical Summarization Content Look Up Table (RFS) Forensic Investigator 05/02/06 Reconnex Confidential
  • 13. Easy to use Browser based access 05/02/06 Reconnex Confidential
  • 14. Drill down to actual content 05/02/06 Reconnex Confidential
  • 15. Moments of Revelation from “Top Down” Work with Reconnex CONFIDENTIAL - All Rights ReservedReconnex Confidential
  • 16. www.reconnex.net 05/02/06 Reconnex Confidential