F5 IPFIX Configuration: IPFIX logging for SIP DoS

Posted in IPFIX configuration, netflow configuration on September 12th, 2014 by Justin
F5 IPFIX Configuration: IPFIX logging for SIP DoS

At the beginning of the year Dale wrote a blog on F5 Networks IPFIX Support. Today, I want to follow up on that post by explaining F5 IPFIX Configuration and configuring IPFIX logging for SIP DoS.

Read more »

Justin
Marketing Manager

Tags: , ,

Cisco NGA Configuration Guide

Posted in Cisco NetFlow, Flexible NetFlow, netflow probe on September 10th, 2014 by Sean
Cisco NGA Configuration Guide

Last week I was working with a customer who needed help with a Cisco NGA Configuration (NetFlow Generation Appliance).  The customer was running the Cisco NGA 3140 (NGA3140-K9) model and had questions with how to setup version 5 versus version 9 NetFlow.  In this blog I will take a look at steps needed to setup the Cisco NGA flows!

Read more »

Sean Harrington
Technical Support
Tags: , ,

Cloud Service Security Checklist : 7 Questions

Posted in cloud service monitoring, Security on September 9th, 2014 by Steve
Cloud Service Security Checklist : 7 Questions

Most companies ask about security before outsourcing to a cloud service. The problem when asking this question is that, many of us don’t really question or test the claims of what the vendor tells us. Why should we, vendors are honest …..right?

Read more »

Steve

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

Malware Incident Response System

Posted in incident response on September 4th, 2014 by mike@plixer.com
Malware Incident Response System

Whether your company has 50 employees or 50,000, someone somewhere in the next 60 days will bring malware into your network. When it happens, what malware incident response system do you have in place to detect it or at least investigate it? Your answer had better be “it depends”.

Read more »

Michael Patterson
Founder and CEO

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: ,

Ixia Network Application and Threat Intelligence using IPFIX

Posted in Network Traffic Analysis on September 3rd, 2014 by Scottr
Ixia Network Application and Threat Intelligence using IPFIX

Last week Ixia announced the integration of their Application and Threat Intelligence Processor and our cyber threat incident response solution.  Using IPFIX, or what Ixia calls Ixflow exports, this combined solution gives administrators additional ability to identify and track users, operating systems and applications that generate excessive traffic or security threats.

Today, I wanted to follow up on that announcement and talk about how you configure this flow export which will increase your overall network and application visibility, and network threat forensics and incident response.

Read more »

Scott Robertson
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!



Tags: , ,