Not a day goes by without alarming reports of increasingly sophisticated cyber attacks on government networks. The reality of these attacks seems to be at odds with government efforts to promote more openness and transparency, but the fact remains that federal agencies ranging from the NSA to DISA still must take proactive steps to ensure that authorized users have access to authorized information at the authorized time.
Open source technology ensures that government agencies can implement the best solutions for their needs without many of the security, interoperability and cost challenges associated with proprietary products. In fact, some of the most innovative network security, traffic analysis, traffic management, application acceleration and mobility solutions are available to government agencies as open source software applications. The enabling technology at the core of many of these applications is deep packet inspection (DPI), which allows for unprecedented visibility into and control over data traversing the network.
Faced with a new generation of network threats, government IT managers are finding that traditional perimeter security tools leave their networks exposed to threats from outside and inside the agency. With DPI-enabled open source applications, government IT managers can set network policy that is customized according to the agency’s unique needs and requirements.
Implementing a multi-application platform as the foundation for DPI-enabled applications ensures minimal porting effort and optimal performance. Moreover, businesses that provide government agencies with these technologies experience significantly reduced product development costs and time-to-market.
This presentation will explore:
Joel Ebrahimi is a solutions engineer at Bivio Networks, where he helps service providers, carriers and government organizations deploy DPI-enabled systems for improved network security, visibility, control and monetization.
Over the course of his career, Mr. Ebrahimi has developed a specialization in high-speed packet analysis, firewall integration, network intrusion prevention/detection, host-based intrusion prevention, open vulnerability and assessment language (OVAL), common vulnerabilities and exposure (CVE) and compliance. He holds a bachelor’s in computer science from the University of California, Santa Barbara.
For information on exhibition and sponsorship opportunities at the conference, contact Sharon Cordesse at email@example.com
Download the OSCON Sponsor/Exhibitor Prospectus
For media-related inquiries, contact Maureen Jennings at firstname.lastname@example.org
To stay abreast of conference news and to receive email notification when registration opens, please sign up for the OSCON Newsletter (login required)
Have an idea for OSCON to share? email@example.com
View a complete list of OSCON contacts