netwit 2.01

#WIKILEAKS A capacity for trust model

CEOs say creativity most important in next 5 years

Both from The Practice of Leadership blog by George Ambler.

January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment


” In many ways we can be described as data we send or receive in today’s network connected environment ”

Chief Technology Officer, NetWitness

“Accessing captured content for network investigations….”

“…A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret.”

Network forensics gets a ‘Minority Report’-style UI
– A network security traffic analysis tool, sporting a wicked UI, heralds a new era of easy cyber forensics

NetWitness NextGen

Know Your Network Like Never Before. Move into the Next Generation of Network Security Monitoring. NetWitness NextGen™.

NetWitness NextGen is the most comprehensive network security monitoring solution ever developed. It is the industry’s first security monitoring software that records everything on the network, re-using it multiple times to solve some of the most challenging problems facing organizations today: insider threats, data leakage, malware activity, asset misuse, network anomalies, compliance, and network e-discovery.

The Threat Landscape
We all can read the headlines – organizations are being hit every day and we are in the middle of an ongoing cyber war.

The external threats are clear and present:

* State-sponsored intrusions and data exfiltrations
* Non-state actors and terrorist groups
* Well-funded and highly-sophisticated organized crime and espionage rings

There are serious problems inside our organizations too:

* Disgruntled employees
* Criminals
* Misconfiguration of systems and networks
* User errors and lack of security awareness
* Volumes of regulatory challenges

The Historical Response
Typical security investments to date have focused on creating islands or layers of protection by installing point solutions that detect a specific problem, issue or threat. Your adversaries don’t think about security as a set of “issues” for which there are multiple answers – they think about how to use the network to get to your data. An effective approach requires organizations to stop deploying point solutions that create protection gaps and overlaps, and start thinking about security as a single requirement.

NetWitness Informer [You can play a bit with the software]

NetWitness Investigator

How do you resolve alerts from your IDS or SIM that you do not understand?
Can you quickly understand the scope and impact of malicious activity on your network?
How can you investigate who is leaking information to your competitors or the press?

Introducing NetWitness Visualize

A revolutionary new way to Visualize network traffic, NetWitness Visualize brings the data to you in a dynamic and interactive interface that anyone can interpret. Included in Informer 2.0, this new feature leverages the award-winning NetWitness NextGen network capture and analysis infrastructure to automatically retrieve and display images, documents, audio and VoIP conversations of interest. Speed up investigations, monitor sensitive documents, and uncover a view of your IT infrastructure that you’ve never seen before.

December 18, 2010 Posted by | asset misuse, compliance, data journalism, data leakage, digital journalism, insider threats, network anomalies, network e-discovery, Network security, network theory, visualisation, WikiLeaks | Leave a comment