Being READY for Disaster with Communications Solutions

FletchRomano

Being ready for disaster includes keeping a business operating even when employees may be forced to work remotely. The Avaya SCOPIA solution offers real time ‘meet-me communications’ from anywhere on any device to enable the smooth flow of interaction and collaboration by employees and customers. Fletch sits down with Rob Romano to discuss Scopia and it’s unique ability to solve this communications challenge faced by businesses today.

Fletch: September has been the National Preparedness Month. We at Avaya have been talking about how to be prepared. In addition, the citizens’ businesses can also be seriously impacted, and while resources can be made available online, communications can significantly be impacted.

Now, Avaya offers several solutions that can provide core communications. One of these is Scopia. Joining me today is Bob Romano, who’s in charge of marketing activities over at Scopia. Welcome, Bob. What exactly is the Scopia Solution?

Bob: The Scopia Solution is a conferencing solution with great capability to have video included in it. It was born really in the video conferencing marketplace. In the sense, it’s growing up to include not only video, obviously audio, but good rich data collaboration, moderation capabilities. Really probably one of its biggest strengths is the fact that it has the capability to be able to join Scopia call from virtually any device that you have and whatever network that device is on.

Fletch: I’ve been using Scopia quite a bit internally in Avaya. I’m having more Scopia calls now than I’m having regular phone calls. How exactly does a customer deploy Scopia? Are we talking about hardware, software. What’s this look like?

Bob: There are several options. Many of our customers will purchase a Scopia system, and then includes servers that are delivered from Avaya. They get installed in their network. That could be a distributed network where they can put those servers around geographically dispersed. Then from that, the rest is all software that allows them to be able to connect in with desktop or mobile devices.

We also have conference room video conferencing systems that we’ll go into a conference room to provide extremely high-quality video conferencing in the conference room environment.

Fletch: One of the biggest things that I find that’s annoying with the various different conferencing utilities that are out there, I’ve always got to go somewhere. I’ve got to make sure I’ve got the software updated. Sometimes that works. Sometimes it’s a pain. How does Scopia handle the client side of the software?

Bob: That’s one of the beauties of Scopia. In fact, if you look at video conferencing’s history, it really focused on conference rooms, room video conferencing where people went to the video. It wasn’t because they necessarily needed to meet in the conference room. It’s because that’s where the device was.

One of the things that Avaya really pioneered was they extension of that video conferencing paradigm out to desktop and mobile users. We have developed technology. This all came from Avaya’s acquisition of Radvision. Radvision was an early pioneer in desktop and mobile capability. What we do is we allow you on a desktop device or a mobile device to be able to simply click on a link that you’ve been invited into a conference.

It will automatically push whatever components are needed on that device, and automatically join you into the conference. It’s the simplicity of it and the reach of it that really has made this such a valuable tool.

Fletch: In general Bob, what would you say are the requirements for the remote users that are going to dial in from a device perspective? Are there any limitations there?

Bob: Well, that’s the beauty of it. There really aren’t. We have clients for PCs both whether they’re Windows based or whether they’re IOS Apple based. We cover Mac and PCs. We have clients that are supported on the Apple devices. That’s iPads, iPhones. Then we have clients for Android devices. That’s a wide variety of different manufactures that provides tablets and phones and mobile devices on the android platform.

That covers a very wide percentage of the users out there that are using either their desktop, their laptop, or their mobile device. The client as I mentioned is 100% free and freely distributable. There is no licensing with it, so the simplicity of that model works very well.

We really tailored it after the web conferencing model, where you get invited into a conference and you click and join. The host is the one that is hosting forward and supports the conference, but guests can come in from anywhere for free. That’s what we adopted to the video conferencing model. It’s worked very well.

Fletch: A couple of weeks ago, I was out in some customer meetings on Long Island, and I had to be over in Connecticut. I took the ferry, the Bridgeport ferry over in the morning. I just happen to have an internal conference call scheduled that came up while I was on the ferry. Without even thinking about it, I just picked up my phone, and I clicked the link to join the bridge because we used Scopia for that. Immediately, everybody was like, “Where are you?”

All they see is me out in the water somewhere taking a ferry across the Long Island sound, but because of the LTE connection that I had, it was just like I’m in my office, which really was interesting.

Bob: Exactly, and really that’s the beauty of it. The idea is that you can use whatever devices available to you. Sometimes I use my PC when I’m home. I work out at my home office. That’s the majority of the time, but quite often if I’m travelling or doing whatever else, I can join with my phone or my tablet.

The beauty by the way of joining on those devices is not just participating in the audio-video component, but fully participating in the data that’s being presented and also being able to moderate it. If I have my staff meeting and I’m on the road, from my mobile device, I can see all the participants in the participants list. I can mute everybody. I can invite new participants. I can lock the conference. I can record it. I have full moderation capability.

The richness of that experience from any device that you’re on is a very important component of our solution.

Fletch: Yeah, and I think one of the benefits that I’ve experienced, because I was one of the initial users on Scopia after the Radvision acquisition, so I’ve been using it internally since day one. The thing that I’ve noticed is that when new features, when new functionalities are being deployed out, you always got that because it’s a click link, right, on your desktop. You’re always being refreshed. You don’t have to manage the clients.

Bob: That’s very important for the IT organizations that are supporting an application like this. For them, the nightmare of having to ensure that all of the users are updated … Remember, we mentioned that it’s not just internal users, but it’s external users that you invite into the call. Anytime somebody clicks the link to join the call, it will automatically test whether the latest software is deployed. If not, it will push the updates and join you in the call.

When you mentioned the Avaya deployment, that’s actually something I’m very proud of. I came with the acquisition of Radvision. In June of 2012 when we were acquired, we decided to deploy Scopia to a select group of sales people so that they could experience, and quite frankly reach out to their customers and use it as a tool.

That started with the deployment of about 4,000 sales people. It has since grown now to almost 10,000 people within Avaya that have virtual rooms, Scopia virtual rooms. Last month in the month of August, and I’m looking at the report now that we pull every month, there were 53,453 meetings with an average of about 3.75 people per meeting across all of it. The maximum number of attendees in a single meeting was 296 by the way with an average of about four participants.

That was over 200,000 participants in the month of August. Those are participants internal to Avaya, that are internal Avaya people using it, but also external. We use it with partners. We use it with analysts. We use it with customers. It’s really been amazing, the adoption of this. That really only happens when a technology is invisible, when the value and the utility of the solution and the simplicity of using it is such that people just adopt it naturally.

Fletch: Well, in addition to eating our own dog food so to speak, I think we really learned about that deployment. When they first started expanding this out, we very quickly saw where we needed to tweak out network, where we needed to tweak our policies. We learned quite a bit from our own deployment, which is ultimately going to make the customer deployments go nice and smooth.

Bob: Exactly right, and we have many customers that have very large deployments like this. We can look at that. We look at our own deployment. We can tell them all kinds of statistics about how we think their usage will be in, how they need to deploy their network. As an example, we know that of these meetings, typically about 84% of them are desktop and mobile users attending the meetings. About 7% are room video conferencing systems join in the call. Multiple people in the room of course, but the device is about 7% of them are room systems.

About 7% are just pure telephone calls that come in and join just the audio only. We have that understanding of the usage of the solution. We do all that by the way through our simple management tool that pulls all that data. We can help customers when they are deploying and looking at this by using our own usage patterns and help them with theirs.

Fletch: That was one of the first things that I appreciated as a user early on in the beta program is when we first started, there were two separate audio conferencing instances so to speak, one that you would use on day to day basis that we had deployed, and then the Scopia one. Then very early in the beta, that all emerged together to where you’ve now got one common audio bridge.

Quite often, I’ll open up Scopia, and it will be all audio participants in there because it’s mostly external people. We weren’t really setting up an audio bridge, but I’m just dialing in through my Scopia, so it’s kind of all there. It really brought there all together in one interface for me. I’m using Scopia as my normal means of communications.

I mean, you don’t normally make phone calls on it, but I’m finding myself when we want to discuss something, instead of calling somebody or setting up a bridge, I’m setting up a Scopia event, which is really interesting to see how it’s changing my way of communicating.

Bob: It’s a meet me here. We call it a virtual conference room. It’s a virtual conference room in the cloud. Everyone in Avaya, there’s 10,000 people that have their own virtual conference room, has this unique ID. We have a plug-in that goes into outlook, which we use for scheduling. When I schedule a meeting in outlook, I just click that little button that says “Scopia meeting”. It automatically populates the invite with all the information for somebody to join the call regardless of what they’re on.

It says, “If you’re on a desktop or mobile, click here.” Again, that pushes that client. If you just want to make a telephone call in, click “dial this number”. If you’re on a room video conferencing system of any vendor by the way, we’re fully standards and fully an operable, dial this way. With that, then it allows people to be able to join from wide variety of devices and again from whatever network those devices are on.

That’s really the utility of it. In our work, we were talking about the National Preparedness Month. It is interesting when Hurricane Sandy came through the East Coast. There was a lot of disruption in terms of Avaya and many other companies obviously, but Avaya employee is able to do business. Our New Jersey office was closed for several days. People were impacted at their homes with their ability to get around.

We utilized Scopia extensively during that period. Those employees to be able to continue to have meetings, and many of them were in coffee shops trying to get a wireless connection. They would come in with their iPads. We had one employee that was stuck and couldn’t get back into the New Jersey area, and stayed in Chicago on a business trip, but just had all of her meetings on Scopia, and really never missed a beat. It was quite amazing.

Fletch: I set up in my local coffee shop as well. I would just go in every morning, and just set up office, and would literally work out of there because they had power. They had food. They had something to drink and bathrooms and WIFI. That’s all I needed.

Bob: The interesting thing about it is that we use technologies on all of our endpoint devices. Specifically, we use a high profile codec. What that does is it compresses the video much more efficiently than normal codecs. It uses about 30 to 50% less bandwidth at any given resolutions. That dramatically improves the ability to be able to have high quality video over all of the networks.

As the network gets faster, that just becomes better, but still bandwidth management and bandwidth utilization is very important. We use other technologies that correct for air packet loss in the network, which is very typical. When you’re on the open internet or you’re on a cellular data network, there will be packet loss. We use technologies like scalable video coding that allows it to be able to not be as impacted by packet loss.

Particularly the video, we’re used to get blotchiness. Now, we have a very smooth video even if there is packet loss in the network. There is a lot of things technologies in the background that significantly improve the quality of the experience. At the end of the day, users don’t care about that. They just know that when they get on, they have a great experience no matter where they are.

Fletch: What did we do at Avaya over the last couple of months? There was a significant change in the quality of the video. It was like we turned on HD one day or something.

Bob: That’s exactly what we did as a matter of fact, Fletch. When we first deployed it, we set it up so that mobile users, desktop, and mobile device users when they came into a call would come in at about half HD resolution, DVD quality. It is what it was. We did that because when we’re deploying it to 10,000 users and we have an over 200,000 participants in a call at any time, we wanted to make sure that we were efficient with our bandwidth usage.

What we found was with the new high profile codecs that we now have across all of our device, our mobile clients have it. Our desktop clients have it. Our room system clients have it. It’s fully supported in the servers. Then we decided, “We can go to HD now with very little impact to the overall bandwidth utilization,” and so we upgraded all of these services to support HD across all of the devices that join. That’s why we’re seeing what was very good quality before, now looks like it’s stunning HD quality.

Fletch: I know. That’s what it is. It is stunning. The day it happened, I looked in my screen. I’m like, “Oh my God! What happened? There’s a big difference here.” Then it was amazing. The cool thing is we didn’t have to go out and touch 10,000 endpoints to do that upgrade either.

Bob: Not at all. There was actually no change to the endpoints at all. It was just a service change internally that we turned on, and because we upgraded our servers with the new high profile capability, then that allowed us to do that.

Fletch: There is going to be a lot of interesting use cases around that. I’m certainly going to want to sit down and talk to you about that in upcoming podcasts. For today, I really appreciate you taking the time to sit down with us. This has really been interesting to see some of the backend to the Scopia product that’s out there.

Bob: Well, I’m happy to do it. I’m always happy to talk about Scopia. It’s a phenomenal product. I’m just really happy that so many people around the world are using it. Certainly within Avaya ourselves, but the deployments now are amazing. Some of the use cases of what people are doing with it are really interesting and a lot of fun. We can talk about those in future podcasts. I’d be happy to do that.

Fletch: I’m absolutely be looking forward to it. Where can someone go to find out more on Scopia and how they can add that functionality into the enterprise environment?

Bob: Go to avaya.com of course. Then underneath there, you’ll find the Scopia product pages, and full descriptions of those. We certainly invite you to go there and take a look.

Fletch: We’ve been talking with Bob Romano, who brought the good technology with him from Radvision. Thanks for sitting down and talking to us.

Bob: You are welcome, Fletch. Thank you.

Related Articles:

Less Maintenance, More Innovation: How to (Finally) Fill the IT Skills Gap

If you take a good look at how the business ecosystem is evolving, you’ll find that it’s being redefined by five key market trends:

You’d be hard pressed to find research that doesn’t indicate the takeover of these five megatrends.

Forrester, for instance, predicts that machine learning and automation will replace 7% of all U.S. jobs by 2025. According to the Economist Intelligence Unit, almost 80% of companies identified digital transformation as their top strategic priority last year. Gartner believes that 70% of all newly deployed apps will run on open source databases by 2018; meanwhile, research continues to show that some 20 to 30 billion objects could be connected to the IoT by 2020.

As these technologies shape our smart digital world, so too do they raise the stakes in terms of customer expectations. Next-generation consumers demand nothing short of a sophisticated digital experience marked by greater quality, agility, speed and contextualization.

The Need to Transform NOW

Driven by these trends, organizations have no choice but to consider how they can adapt to grow and thrive. Competitors are moving at rapid new paces and blazing unforeseen trails. We’re seeing this disruption industry-wide, from companies like Uber and Lyft that have revolutionized the taxi industry (taxi trips have fallen by as much as 30% in cities like L.A.) to Airbnb, which turned the hospitality industry on its head by introducing the concept of an end-to-end digital homestay experience.

Look around and you’ll see just how much your own industry is changing. Do you realize how much new ground is ready to be broken? How much unexplored territory there is to seize? The organizations that thrive will be the first to not only see the possibilities, but successfully execute them. To do so, however, companies must undergo some level of transformation—and IT must be a central part of that transformation.

Elevating IT to Accelerate Business

To enable business to move at a pace that maintains a competitive edge, leaders must ask themselves how they’re empowering their IT staff. As it currently stands, something needs to be done about today’s IT skills gap. What we’re seeing is too many departments tied down to costly, archaic systems that hinder performance and productivity. There are too many people doing the same things and expecting different results. In a world where IT maintenance and innovation must be expertly balanced, teams are working to keep the lights on and not spending enough time learning new technologies and strategies or becoming part of the solution. This has been an ongoing problem that needs to be talked about less and acted on more.

The bottom line is that organizations will only truly accelerate in the digital era if IT spends enough time on strategic initiatives. Consider that 60% of top-performing companies engage IT to gather ideas for innovation, and 49% collect ideas through business unit workshops facilitated by IT. Without question, IT should be factored as a critical part of business innovation.

So, how can businesses free their IT teams to begin innovating? The right technology here is key—specifically, it has to be a combination of business process automation over an automated, end-to-end, meshed networking architecture. Let’s first focus on networking—this open, agile and integrated platform liberates IT by substantially reducing the level of complexity associated with traditional network maintenance, allowing teams to spend more time on high-level strategic initiatives. I’d like to take a look at how such a platform helps fill the IT skills gap from a traditional networking standpoint and outline some of the security benefits this architecture can bring.

Networking

Traditional legacy architecture, often referred to as “client-server” is becoming near obsolete thanks to the proliferation of automation and M2M. But before we jump too quickly, you may remember the resistance from peer-to-peer communication where IT in fact won the battle and for the most part didn’t allow it—simply put, the legacy architecture couldn’t sustain it. As manual processes continue to be replaced by smarter, automated processes, it’s imperative that organizations start thinking differently in terms of networking.

This may mean, for example, seamlessly integrating AI and machine learning into their communications strategy to engage customers with flexible new touch points. This will also likely require the integration of services from several vendors with different capabilities, versus one single provider, hence the importance of having an open ecosystem with standards as much as possible.

Regardless of how organizations go about it, the fact is that they must begin moving their networks in a new direction if they wish to progress at the pace their business needs to. Fully-meshed, end-to-end architecture offers an open ecosystem in which businesses can begin freely automating, integrating and reinventing traditional processes without a high level of complexity. This time freedom enables IT to begin reimagining business outcomes. The use of open, integrated, future-proof technology opens new doors of opportunity to do so.

Security

With billions of IoT devices directly communicating and sharing data, organizations are now operating in an essentially borderless network—or as I like to call it, the everywhere perimeter. While this everywhere perimeter enables organizations to operate with unmatched agility and ease, it can also destroy companies if left unprotected. As one can imagine, the strategy and technology needed to protect a virtually borderless network look drastically different than those protected by a traditional firewall or legacy network architecture (Static VLANs, ACLs). This is exactly why IT needs to flex its strategic muscles and identify a stronger security approach, one that safeguards the organization with a near impenetrable network that significantly minimizes security risks and reduces exposure.

An end-to-end meshed networking architecture lets organizations quickly and securely enable services across the network anywhere they are consumed (i.e., personal mobile device, Wi-Fi hotspot, corporate campus). This is done through end-to-end network segmentation, which is widely considered to be the holy grail of network security today. Comprised of three core components—hyper-segmentation, native stealth and automated elasticity—this solution ensures organizations have the necessary framework for next-generation cybersecurity defense. By minimizing security risks in this way, organizations can ensure they are maximizing the value of IT. Lay the foundation right first, then focus on business process workflow automation. Doing the opposite or simply ignoring the foundation will cause pain and slow down your business transformation while making it extremely difficult to maximize the benefits of, for example, IOT.

In the end, every important business initiative requires time. Organizations won’t be able to reinvent themselves if their IT department has none to spare.

2017 Avaya Customer Innovation Awards Honor Five Companies Leading the Way in Digital Transformation

Every year, Avaya and IAUG recognize a handful of customers who are innovators. These customers are recognized with Customer Innovation Awards. Last year’s award winners included a number of technology firms. This year’s five award winners, recognized on stage at Avaya Engage in Las Vegas, include three customers in the financial services sector, a leading global retailer, and a leader in the film production industry.

Each of these customers is benefiting from the latest Avaya solutions to meet business goals—whether the goals are growth, customer experience, cost management, or risk mitigation.

BECU

BECU, which began life 80 years ago as the Boeing Employee Credit Union, today is the fourth largest credit union in the US, with over $12 billion in assets and over a million credit union members. In 2016, BECU embarked on a digital transformation journey focused on the customer experience. BECU relies on Avaya Elite Multichannel running on an Avaya Pod Fx™ infrastructure.

BECU engineer Rick Webb says, “BECU is rapidly expanding and needed a technology partner that could support that expansion and keep our members happy. The Avaya Elite Multichannel infrastructure does just that, while providing increased flexibility and allowing BECU to better meet the expectations of our more than 1 million members.”

Green Shield Canada (GSC)

Green Shield Canada (GSC) is a one of the leading health and dental benefit carriers in Canada, with over 850 employees across seven locations. Starting last year, GSC is deploying the Avaya Equinox™ Experience and seeing strong results. Competing with larger players in its industry, GSC sees strong collaboration among its workforce as a key ingredient for success.

Jim Mastronardi, GSC Director for Enterprise Infrastructure says, “Green Shield Canada has over 850 employees across seven offices in Canada—from Montreal to Vancouver. We saw an opportunity to explore technology upgrades that would enhance company-wide communications and bring our teams across Canada closer together. With just a single training session, employees have hit the ground running with the Avaya Equinox tools. The video conferencing option has provided a solution to overbooked meeting rooms, and the instant messaging feature is already cutting down on the number of emails being sent.”

Scotiabank

Scotiabank prides itself on “being a technology company providing financial services.” As a long-time Avaya customer—and a beta customer for Avaya Oceana™ and Avaya Oceanalytics™—Scotiabank is on a digital transformation journey to better serve bank customers worldwide. Scotiabank contact centers located in Canada and the Caribbean & Latin America region have benefited from a next-gen centralized architecture leveraging the latest Avaya solutions to better serve customers.

Scotiabank has already developed and deployed Avaya Oceana and Avaya Breeze™ apps, and continues to innovate in an ongoing drive to improve customer service and meet customer needs in a competitive market. The success of Scotiabank’s transformation program has enabled the bank to move with greater agility, improved reliability, and speed to market. This has changed the framework for deployment from months/years to days/weeks while improving the overall ROI/TCO.

The Crossing Studios

The Crossing Studios is one of Vancouver’s largest and fastest growing full-service studios and production facilities for film. The firm caters to companies like Fox, Nickelodeon, Showtime, and Netflix. The Crossing Studios were unhappy with the stability and quality of the disparate systems previously in place across their seven studio locations. In 2016, The Crossing Studios deployed a Powered by Avaya IP Office solution offered by local provider Unity Connected Solutions.

Powered by Avaya IP Office has improved stability, reduced TCO and provided the advanced features that the business needs to serve a very demanding film industry client base, including high scale audio conferencing, extensive web collaboration, and rich multi-vendor HD video conferencing. CTO Mark Herrman says, “We needed something that would support our rapid growth, support our clients, and support our bottom line. Thanks to IP Office and the hosted cloud model, we’re able to keep pace with dynamic, fast-moving film productions, staying as flexible as our clients need us to be.” Estimated savings are in the six figures for the first year alone.

Walgreens

Walgreens is using custom Avaya Snap-ins to bring centralized contact center reporting capabilities to local branch sites, for compliance purposes and to help improve the overall customer experience. Avaya Professional Services were instrumental with the deployment, which relies on an Avaya Pod Fx infrastructure.

These companies are each leaders in their respective industries. As part of their digital transformation journeys, they recognize that when it comes to selecting a trusted technology advisor, “experience is everything.” #ExperienceAvaya.

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know what to look for and how to spot it.

Look for patterns of behavior that are unusual from a historical standpoint. Some things to look for are unusual patterns of session activity. Port scanning and the use of discovery methods should be monitored as well. Look for unusual TCP connections, particularly lateral or outbound encrypted connections.

Remember that there is a theory to all types of intrusion. An attacker needs to compromise the perimeter. Unless the attacker is very lucky, they will not be where they need or want to be. This means that a series of lateral and northbound moves will be required to establish a foothold. In order for any information to leave your organization there has to be an outbound exfiltration channel. This is another area where APTs have to diverge from the normal behavior of a user.

Here’s what to look for:

  • Logon Activity:

    Logons to new or unusual systems can be a flag. New or unusual session types are also a flag to watch for, particularly outbound encrypted sessions or unusual time of day or location. Watch for jumps in activity or velocity.

  • Program execution:

    Look for new or unusual program executions at unusual times of the day or from unusual locations. Execution of the program from a privileged account status rather than a normal user account should also be alarming.

  • File access:

    Look for unusually high volume access to file servers or unusual file access patterns. Also be sure to monitor cloud-based sharing uploads as these are a very good way to hide in the flurry of other activity.

  • Network activity:

    New IP addresses or secondary addresses can be a flag. Unusual DNS queries should be looked into, particularly those with a bad or no reputation. Look for the correlation between the above points and new or unusual network connection activity. Many C2 channels are established in this fashion.

  • Database access:

    Most users do not have access to the database directly. But also look for manipulated applications calls doing sensitive table access, modifications or deletions. Be sure to lock down the database environment by disabling many of the added options that most modern databases provide. An application proxy service should be implemented to prevent direct access in a general fashion.

     

    The goal is to arrive at a risk score based on the aggregate of the above. This involves the session serialization of hosts as they access resources. The problem with us as humans is this: if we’re barraged with tons of data and forced to do the picking out of significant data, we are woefully inefficient. First of all, we have a propensity for missing certain data sets. How often have you heard the saying, “Another set of eyes”? Never manually analyze data alone, always have another set of eyes go over it.

     

    At Avaya we’ve developed a shortest path bridging networking fabric we refer to as SDN Fx™ Architecture that is based on three basic self-complimentary security principles:

    • Hyper-segmentation: This is a new term that we’ve coined to indicate the primary deltas of this new approach to traditional network micro-segmentation. First, hyper-segments are extremely dynamic and lend themselves well to automation and dynamic service chaining, as is often required with software-defined networks. Second, they are not based on IP routing and therefore do not require traditional route policies or access control lists to constrict access to the micro-segment. These two traits create a service that is well suited for security automation.
    • Stealth: Due to the fact that SDN Fx is not based on IP, it is dark from an IP discovery perspective. Many of the topological aspects to the network, which are of key importance to APTs, simply cannot be discovered by traditional port scanning and discovery techniques. So the hyper-segment holds the user or intruder in a narrow and dark community that has little or no communications capability with the outside world, except through well-defined security analytic inspection points.
    • Elasticity: Because we are not dependent on IP routing to establish service paths, we can extend or retract certain secure hyper-segments based on authentication and proper authorization. Just as easily however, SDN FX can retract a hyper-segment, perhaps based on an alert from security analytics that something is amiss with the suspect system. There may even be the desire to redirect them into Honey pot environments where a whole network can be replicated in SDN Fx for little or no cost from a networking perspective.

In the End

Hardly a day goes by without hearing about a data breach somewhere in the world. To combat these breaches, it’s imperative to understand how APTs work and how you can detect them. Remember—prevention is ideal, but detection is a must!

With this blog series, I hope I’ve helped you see how to limit the impact of APTs on your enterprise. If you missed a blog post, here’s the whole series:

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

APTs Part 2: How the Advanced Persistent Threat Works

APTs Part 3: Prevention is Ideal, But Detection is a Must

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?