DPI Digest: IS, Virtualization and Regulation

    In the 5th thematic digest, we will talk about network technologies, provide basic analytics on information security and materials on the traces of legislative innovations.

    Other digest editions:


    / Flickr / pascal / PD
    5 problems of NFV
    • Familiar with the main challenges in working with Network Functions Virtualization and virtual network nodes. We look at the architecture, working with outdated networks, security problems and the situation with standards and practical cases.
    VPLS for data center access
    • Virtual Private LAN Service is one of the most flexible tools for gaining access to servers located in data centers. Here we provide a small tutorial on how to connect, talk about the features of VPLS and the benefits of virtualization.
    Bypass Network Cards - Resiliency in DPI Networks
    • How Bypass technology allows you to pass traffic from port to port, bypassing the controller, even when the power to the network board is turned off. Let's talk about where I use boards with Bypass-mode, what is on the market and how to make a choice.
    Convergence and unification - multiple tasks on one device
    • We talk about the advantages of converged infrastructure, give examples of popular converged systems and draw parallels with the SCAT DPI traffic monitoring and analysis system.

    IB

    Stages of cyberattacks
    • We talk about the “investigation” of the victim, establishing control, arranging access and other stages of the attacks. In addition, we briefly dwell on security measures.
    What you need to become an IT security engineer
    • We deal with what is within the competence of an IT security engineer. And briefly dwell on what is needed to start a career path in this field of activity.
    VPN - connection types and security checks
    • The classic material about the pros and cons of using a VPN, protocols, organizing remote access and checking the security of a VPN connection.
    Encrypted traffic can be classified
    • About how a provider can flexibly manage traffic without the need to decrypt user data. We are talking about SSL / TLS, P2P and Skype traffic.
    How to securely share passwords on your network
    • We give examples of corporate password managers and write about setting up automatic access to devices without entering a password, one-time passwords and an alert system when gaining access to a password.

    / Flickr / pascal / PD

    Law and order


    URL filtering under the law
    • We are talking about the basic methods of blocking: by IP address, by SNI and by certificate. We analyze an example of a corresponding MITM attack and emphasize the illegality of such actions.
    Alerting the public about emergencies is a new responsibility of the Internet provider
    • We consider the innovation in the context of modern warning systems, international experience and briefly dwell on how providers can implement emergency message delivery.
    SORM-3 standard implementation plan
    • What is included in the list of requirements for the implementation of the SORM-3 system - we look at this task from the point of view of the customer and the contractor.
    What will happen to Internet providers after July 1, 2018
    • We consider the "Spring Package", basic requirements and fines. In addition, we are talking about how to mitigate the negative effects of this innovation.

    Miscellaneous

    Webinar "SORM-3 and traffic filtering"
    • Today (September 28, 2017) at 11-00 Moscow time, VAS Experts will conduct a webinar “SORM-3 and traffic filtering”. We will talk about practical cases, scenarios, features, differences and various nuances of the implementation of SORM-1, SORM-2, SORM-3.
    VAS Experts at ASIA 2017 GCCM in Singapore
    • We talk about our participation in the 7th annual meeting of members of the ASIA 2017 GCCM club. At GCCM, our company introduced the SCAT DPI product.
    Interview with Maxim Khizhinsky - C ++ DPI System Developer
    • The leading software engineer of our company and one of the experts of the development team of the SCAT DPI deep traffic analysis platform tells about himself, the applied aspects of his work and personal interests.

    Also popular now: