To Whom this Presentation is
|Slideshow ^ |< << Slide 1 of 11 >> >||
- Would you like to be able to:
verify in practice what actually happens in the network,
- discover where from (vulnerable) services can be accessed,
- discover misbehaving hosts,
- discover access control violations and
- monitor the incoming traffic flows with the ability to drill-down to the packet-level.
If your answer is yes to one or more of these questions, I believe your time is well spent.