NiravShah

About Nirav Shah

Nirav oversees strategy and roadmap development for the Corero Network Security products and solutions.  He is a 20-year veteran in the networking industry with a unique blend of product management, business development and engineering experience.  In the past, Nirav has held product management, engineering leadership, and technical roles in large networking and software companies as well as venture-backed startups.  Nirav is a co-holder of a US patent in configuration and management of RFID systems (patent no. 7,567,179).

Posts by Nirav Shah

Don't Dig a Well When Your House is on Fire

Relying on human intervention to mitigate DDoS attacks is like digging a well when your house is on fire. When it comes to ensuring service availability and maintaining uptime and SLAs, hosting providers should use minimal (if any) manual intervention when defending against a DDoS attack.

Read more

The double-edged sword of operating a hosting data center  

The more customers you host in your data center, the better, right?  Of course, that means more revenue.  And if those customers are in multiple industry verticals, even better, correct?  Supporting a variety of customer types protects  against revenue fluctuations if rough economic times affect a certain vertical and not the...

Read more

The DDoS myth about the firewall and the IPS

It is about time we put an end to the myths that often come up when choosing a network security solution to protect against distributed denial of service (DDoS) attacks.  We'll take a look at a couple of common myths, namely: Myth #1: An IPS can protect against Distributed Denial of Service (DDoS) attacks Myth #2: A...

Read more

Using sFlow for Security Analytics

sFlow (sampled flow) is a scalable protocol for statistical monitoring of a network.  When used for security monitoring, it can provide valuable insight for establishing baseline behavior and identifying deviations from the baseline.  Security administrators can be alerted when an anomaly is detected and investigate whether new security...

Read more

Finding Needles in the Haystack of Security Events

I hate to throw a cliché at you, but when it comes to security event and log management, a picture (or a handful of pictures) is certainly worth a thousand words.  Security devices generate volumes of raw data, usually in a proprietary manner.  Parsing such unstructured data and making sense out of it is a tedious, if not an...

Read more