by cws on 2/17/16, 9:07 PM with 12 comments
by runn1ng on 2/17/16, 9:47 PM
That's a good point, I guess.
(however, the blog is on a page of a company, that seems to me to be selling network monitoring devices.)
by molecule on 2/17/16, 10:29 PM
...
> Well? Can you see those intrusions, and see where they try to go next? Do you have the visibility into the East-West traffic that Joyce describes as being so crucial to stopping advanced, persistent threat actors from exploiting you?
> ExtraHop can give it to you. Our platform auto-discovers and classifies every device, every interface, and every application that touches your network, and can observe and analyze ever transaction in real time. We give you all the information you need to stay one step ahead of anyone who might be trying to break into your network.
> Read our security operations use cases or try our free demo to see how.
This reads like an advertisement.
by nickpsecurity on 2/18/16, 12:10 AM
So, definitely use taps. Just use them with one way cables on air gapped machines. Dont trust OS or router-level isolation against High Strength Attackers.
Note: Does anyone know if this one uses a one-way cable? I didnt delve into details too much.
by jostmey on 2/17/16, 9:35 PM
by tsupasat on 2/18/16, 12:37 AM