Quantcast
Channel: Mike Patterson – Extreme Networks
Browsing latest articles
Browse All 28 View Live

NetFlow v5 Vs. NetFlow v9

You can’t decide; what is the difference between NetFlow v5 Vs. NetFlow v9? This post explains what you get with NetFlow v5 and the enhancements brought about with NetFlow v9 which is the basis for the...

View Article



Network Threats: You’re already infected

It’s time to stop worrying about the network threats that will infiltrate your company and assume that one or more already has. Organizations need to stop thinking that the firewall, IDS and antivirus...

View Article

Network Traffic Monitoring: BYOD, Cloud Services and Internet Threats

Due to constant BYOD mobility in and out of the corporate environment, Chief Security Officers have been forced to take a closer look at managing this technological movement and how network traffic...

View Article

Image may be NSFW.
Clik here to view.

The Business Value of NetFlow

The increased awareness surrounding Advanced Persistent Threats and other types of malware have most security professionals searching out the best way to minimize this type of infection.  They realize...

View Article

Image may be NSFW.
Clik here to view.

Performing a Forensic Threat Investigation

The growing assumption these days is that malware and threats are already camped out on our networks.  The onslaught of spear phishing attempts and click jacking efforts has prevailed and infected our...

View Article


Image may be NSFW.
Clik here to view.

Investigating Internal Network Attacks

Most network threat detection systems are positioned at the edge and lack visibility into internal traffic.  When these devices detect a potential insurgence that is reaching out to the Internet,...

View Article

Image may be NSFW.
Clik here to view.

Locate BYOD Devices with Network Management: Use NetFlow and Mobile IAM

Most of us have experienced the frustration of temporarily misplacing our phones; how do you recover a BYOD device? I’ve seen people take several approaches that usually don’t involve network...

View Article

Image may be NSFW.
Clik here to view.

BYOD Costs : What are the BYOD Risks?

What are the annual BYOD costs? From what I read, the annual company cash BYOD benefits  from smart phones, tablets and the like ranges from $300 to $1,300 per employee, depending on the employee’s job...

View Article


Image may be NSFW.
Clik here to view.

Employers Ban Streaming: Use NetFlow for Network Traffic Monitoring

Some companies are starting to ban network traffic streaming.  Companies such as Procter and Gamble (P&G) are banning sites like Facebook.com and NetFlix. CNN cited an internal report that found...

View Article


Image may be NSFW.
Clik here to view.

Combating Advanced Persistent Threats with NetFlow

Does your company have a strategy for detecting and combating Advanced Persistent Threats? Victims of APTs include Adobe, Google, Lockheed Martin, Sony, RSA and several others.  Lets start by making...

View Article

Image may be NSFW.
Clik here to view.

Threat Detection with NetFlow

Enterasys was one of the first companies to build switches that support NetFlow and certainly understands the value of being able to quickly determine the top talkers, protocols and applications on the...

View Article

Image may be NSFW.
Clik here to view.

5 Reasons for NetFlow: Network Traffic Management

I’m tired of the same ol’ pitch on why companies should be using NetFlow for Network Traffic Management.  In this post I will leverage idioms to explain how NetFlow and IPFIX are being used beyond most...

View Article

Image may be NSFW.
Clik here to view.

Network Quality of Service: Prioritization of VoIP, Salesforce.com and...

FIFTY (50%) of consumer Internet traffic is video and do you know what it is doing to Quality of Service on your network? Do you think all of those new BYOD applications are being put to good use...

View Article


Image may be NSFW.
Clik here to view.

End to End Visibility: Path Through the Network

Quality of Service (QoS) is a paramount concern for most network administrators.  To try an guarantee it, the prioritization of voice, video and other business applications are generally configured on...

View Article

Image may be NSFW.
Clik here to view.

Security in IT: Cell Phones

With security experts like Dmitri Alperovitch claiming that all fortune 2000 companies have been hacked, it is understandable that many organizations are making security in IT a primary concern.  One...

View Article


Image may be NSFW.
Clik here to view.

Reporting on URLs with NetFlow

Are you looking to gain details on URLs from NetFlow or IPFIX?  Here’s a possible solution for some of you.  If you have a Squid logs, Bluecoat logs or other type of device that can export any type of...

View Article

Image may be NSFW.
Clik here to view.

What is a Software Defined Network

Software Defined Networks (SDN) are gaining popularity for several reasons.  This post will outline the drivers for this evolution as well as important considerations that network administrators will...

View Article


Image may be NSFW.
Clik here to view.

Extreme Networks IPFIX Support

I took some time recently to test our NetFlow collector against the Extreme Networks IPFIX export.  The results came back positive with a few interesting highlights.  The first of which I haven’t seen...

View Article

Image may be NSFW.
Clik here to view.

Cyber Attack: Incident Response

Every day, your company is receiving tens of thousands of emails.  Most of it is legitimate, work related stuff, but hidden within these messages could be phishing attacks. These insidious messages are...

View Article

Image may be NSFW.
Clik here to view.

Next Generation Malware Investigation Technology

The next threat could emerge anywhere on the network and when it does, what will you rely on to gain insight into its traffic patterns? Moving the packet analyzer to just the right location simply...

View Article

Image may be NSFW.
Clik here to view.

Monitoring DNS NXDOMAIN

Are you interested in monitoring BYOD traffic headed to the Internet for security threats? You should be paying close attention to DNS traffic, specifically NXDOMAIN.  The NXDOMAIN is a DNS message...

View Article

Browsing latest articles
Browse All 28 View Live




Latest Images