Flexible NetFlow: NBAR NetFlow configuration

Posted in netflow configuration, network security on October 22nd, 2014 by Joanne
Flexible NetFlow: NBAR NetFlow configuration

Did you ever consider that using Flexible NetFlow, specifically an NBAR NetFlow configuration, could provide another aspect of network security for you?

Exporting NBAR (Network Based Application Recognition) in Flexible NetFlow records provides the opportunity for deep packet inspection visibility in NetFlow reporting.  Once you have that visibility, you’re just a half step away from also using that information for detecting unwanted traffic on your network.

Read more »


Joanne Ghidoni
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

How To Investigate Malware

Posted in cyber attack, incident response on October 16th, 2014 by Patti
How To Investigate Malware

If you are looking to learn about how to investigate malware, chances are you’re already infected and under the gun to uncover the source and clean up the mess. Here are a few things to consider before you dig in.

Incident Response System

Read more »

Patti

For a free 30 day trial of Scrutinizer, Download Now!

Tags: , ,

sFlow vs NetFlow Comparison

Posted in NetFlow, sFlow on October 15th, 2014 by Sean
sFlow vs NetFlow Comparison

I have been working with a number of customers who asked for a sFlow vs NetFlow comparison.  They were concerned about the amount of visibility they were seeing with the sFlow (sampling) technology and why those reports were so different from their NetFlow reports.  In response to all those requests, I setup a lab to show you some of these differences!

Read more »

Sean Harrington
Technical Support
Tags: ,

Application Performance Metrics : Cisco AVC Support

Posted in application performance monitoring, Cisco AVC on October 13th, 2014 by mike@plixer.com
Application Performance Metrics : Cisco AVC Support

When searching for application performance metrics, what you’re looking for really depends on the application being monitored. A good question to ask yourself is: does the application I need to improve the performance of run locally on the computer without the use of the network? If it does require the network, does the application run largely locally in a console requiring only limited network access or does it require lots of network access like many web based applications? Loaded with this information, you have to move onto the next set of questions:

Read more »

Michael Patterson
Founder and CEO

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: ,

Incident Response System Guidelines

Posted in General, incident response, netflow and ipfix on October 9th, 2014 by ryans

Working in support, customers often ask me how to start using NetFlow and IPFIX in their network monitoring tool, to get a more proactive approach to detecting threats. This is why I have decided to go over a few incident response system guidelines that will save you time and money when your network is hit by the next string of malware or advanced persistent threat (APT). Jalisa pointed out yesterday that the average security breach cost can be up to $3.5 million. Let’s go over a few ways to utilize NetFlow and IPFIX to lessen the impact.

Read more »

Ryan Slosser

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , , ,