Addressing Higher Education's Need for Greater Network Control and Security
Tuesday, April 05, 2011 | 3:00PM–3:45PM | Texas Ballroom Foyer/Fourth Level
Session Type:
Professional Development
Discover how, by collecting and analyzing flow data (NetFlow, sFlow, jFlow, etc.), administrators can gain end-to-end network visibility across physical and virtual networks; detect and prioritize suspicious and malicious host and network behaviors; tie all host and network activity to IP, username, and systems involved; and demonstrate compliance.