NetFlow v5 Vs. NetFlow v9
You can’t decide; what is the difference between NetFlow v5 Vs. NetFlow v9? This post explains what you get with NetFlow v5 and the enhancements brought about with NetFlow v9 which is the basis for the...
View ArticleNetwork Threats: You’re already infected
It’s time to stop worrying about the network threats that will infiltrate your company and assume that one or more already has. Organizations need to stop thinking that the firewall, IDS and antivirus...
View ArticleNetwork Traffic Monitoring: BYOD, Cloud Services and Internet Threats
Due to constant BYOD mobility in and out of the corporate environment, Chief Security Officers have been forced to take a closer look at managing this technological movement and how network traffic...
View ArticleThe Business Value of NetFlow
The increased awareness surrounding Advanced Persistent Threats and other types of malware have most security professionals searching out the best way to minimize this type of infection. They realize...
View ArticlePerforming a Forensic Threat Investigation
The growing assumption these days is that malware and threats are already camped out on our networks. The onslaught of spear phishing attempts and click jacking efforts has prevailed and infected our...
View ArticleInvestigating Internal Network Attacks
Most network threat detection systems are positioned at the edge and lack visibility into internal traffic. When these devices detect a potential insurgence that is reaching out to the Internet,...
View ArticleLocate BYOD Devices with Network Management: Use NetFlow and Mobile IAM
Most of us have experienced the frustration of temporarily misplacing our phones; how do you recover a BYOD device? I’ve seen people take several approaches that usually don’t involve network...
View ArticleBYOD Costs : What are the BYOD Risks?
What are the annual BYOD costs? From what I read, the annual company cash BYOD benefits from smart phones, tablets and the like ranges from $300 to $1,300 per employee, depending on the employee’s job...
View ArticleEmployers Ban Streaming: Use NetFlow for Network Traffic Monitoring
Some companies are starting to ban network traffic streaming. Companies such as Procter and Gamble (P&G) are banning sites like Facebook.com and NetFlix. CNN cited an internal report that found...
View ArticleCombating Advanced Persistent Threats with NetFlow
Does your company have a strategy for detecting and combating Advanced Persistent Threats? Victims of APTs include Adobe, Google, Lockheed Martin, Sony, RSA and several others. Lets start by making...
View ArticleThreat Detection with NetFlow
Enterasys was one of the first companies to build switches that support NetFlow and certainly understands the value of being able to quickly determine the top talkers, protocols and applications on the...
View Article5 Reasons for NetFlow: Network Traffic Management
I’m tired of the same ol’ pitch on why companies should be using NetFlow for Network Traffic Management. In this post I will leverage idioms to explain how NetFlow and IPFIX are being used beyond most...
View ArticleNetwork Quality of Service: Prioritization of VoIP, Salesforce.com and...
FIFTY (50%) of consumer Internet traffic is video and do you know what it is doing to Quality of Service on your network? Do you think all of those new BYOD applications are being put to good use...
View ArticleEnd to End Visibility: Path Through the Network
Quality of Service (QoS) is a paramount concern for most network administrators. To try an guarantee it, the prioritization of voice, video and other business applications are generally configured on...
View ArticleSecurity in IT: Cell Phones
With security experts like Dmitri Alperovitch claiming that all fortune 2000 companies have been hacked, it is understandable that many organizations are making security in IT a primary concern. One...
View ArticleReporting on URLs with NetFlow
Are you looking to gain details on URLs from NetFlow or IPFIX? Here’s a possible solution for some of you. If you have a Squid logs, Bluecoat logs or other type of device that can export any type of...
View ArticleWhat is a Software Defined Network
Software Defined Networks (SDN) are gaining popularity for several reasons. This post will outline the drivers for this evolution as well as important considerations that network administrators will...
View ArticleExtreme Networks IPFIX Support
I took some time recently to test our NetFlow collector against the Extreme Networks IPFIX export. The results came back positive with a few interesting highlights. The first of which I haven’t seen...
View ArticleCyber Attack: Incident Response
Every day, your company is receiving tens of thousands of emails. Most of it is legitimate, work related stuff, but hidden within these messages could be phishing attacks. These insidious messages are...
View ArticleNext Generation Malware Investigation Technology
The next threat could emerge anywhere on the network and when it does, what will you rely on to gain insight into its traffic patterns? Moving the packet analyzer to just the right location simply...
View ArticleMonitoring DNS NXDOMAIN
Are you interested in monitoring BYOD traffic headed to the Internet for security threats? You should be paying close attention to DNS traffic, specifically NXDOMAIN. The NXDOMAIN is a DNS message...
View Article
More Pages to Explore .....