Part 1: Elevating Enterprise Security with Fidelis Network and Deception
Securing a modern global enterprise is not easy by any stretch of the imagination. The list of technologies and requirements that contribute to the networks of large organizations are sometimes mind-boggling: cloud computing, on-premises systems, mobile workers, diverse data privacy regulations and laws, and cross-platform device support, to name a few. Over the past few years, these complexities have continued to drive one core concept: Security teams cannot defend complex networks without holistic, correlative insight into the environment.
In this first part of a two-part review, Matt Bromiley reviews Fidelis Elevate with respect to its ability to provide insight into network traffic, threats, deception and endpoint activity. Download this webcast to learn how Fidelis Network and Deception enables:
- Holistic visibility into network activity
- Focused investigations
- Deception techniques
Be sure to watch the second part of this two-part review: Elevating Enterprise Security with Fidelis Endpoint to learn how to monitor endpoint behavior activity by using the same Fidelis Elevate platform.
Gerald Mancini has led the development of Fidelis Elevate since 2005, through its beginnings as a venture-backed start-up company. Under his leadership, the Fidelis product line evolved from a content-based network security tool to the Elevate platform designed to detect and respond to any activity along the cyber kill chain. Prior to joining the company, Mancini served as Director of Engineering at Torrent Network Technologies, where he led the development of an edge-router product which included software, hardware and custom chip design efforts. His tenure at Torrent continued after the company was acquired by Ericsson and the development effort shifted toward IP routing products for wireless infrastructure networks. Prior to joining Torrent, Mancini led chip development and system test for Nexion, an ATM switch manufacturer, both before and after its acquisition by Fujitsu.
Matt Bromiley is a SANS Digital Forensics and Incident Response instructor, teaching FOR508 Advanced Incident Response, Threat Hunting and Digital Forensics and SANS FOR572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response, and a GIAC Advisory Board member. He is also an incident response consultant at a major incident response and forensic analysis company, combining experience in digital forensics, incident response/triage and log analytics. His skills include disk, database, memory and network forensics, as well as network security monitoring. Matt has worked with clients of all types and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.