Assume all Networks are infected

Posted in incident response on July 31st, 2014 by Dalel
Assume all Networks are infected

We used to be proactive and assume that the firewall and anti-virus were protecting us. This was a pretty reliable defense method against cyber-attacks because nearly all infections immediately made their presence known by wreaking havoc with either the local computer or with the network.  That isn’t so much the case anymore.  We have entered the next phase of cyber threat detection where we assume all networks are infected. Today defenses need to include an incident response system.
Read more »

Dale

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

Detecting Network Scans using NetFlow

Posted in IPFIX Traffic Analysis, NetFlow Reporting, NetFlow Security on July 30th, 2014 by Jake
Detecting Network Scans using NetFlow

As a continuation of our Network Security series, I wanted to write a blog on detecting network scans using NetFlow and IPFIX.  Since a network scan is often the first step in identifying vulnerabilities on a target’s network it is usually the best place to start in detection. Since there are numerous types of network scans that attackers can use to probe your network it can be a very hard behavior to track. Luckily, if your reading this blog you probably have NetFlow and IPFIX capable devices on your network, which will aid in detection and mitigation of these types of threats. Read more »

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

Securing SCADA systems with NetFlow

Posted in SCADA on July 24th, 2014 by Justin
Securing SCADA systems with NetFlow

Supervisory Control and Data Acquisition (SCADA) is a system that provides control of remote equipment. Such equipment, including heating, ventilation, and air conditioning (HVAC) systems, however, has been found to be connected to the Internet in some cases with inadequate security. This, understandably, provides hackers with a potential gateway to critical corporate systems.

Read more »

Justin
Marketing Manager

Tags: , ,

Citrix CloudBridge IPFIX Support

Posted in Network traffic monitoring on July 23rd, 2014 by Scottr
Citrix CloudBridge IPFIX Support

Enterprise wide WAN optimization reporting is now available from Citrix CloudBridge with a new configuration option that offers IPFIX support.

With the expansion of branch offices, addition of applications like VoIP and video, and data center consolidation, today’s networks are seeing more WAN traffic than ever. This means more focus on the WAN capabilities. The WAN is no longer just expensive network infrastructure, it has become an asset that network managers can leverage to benefit their bottom line.

With the latest firmware release 7.2, Citrix introduced IPFIX support on their CloudBridge WAN Optimization product line. Administrators can now export a wealth of application data, which enables enterprises to monitor and analyze real-time and historical data.

Read more »

Scott Robertson
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!



Tags: , ,

Cisco EzPM NetFlow config: Easy Performance Monitoring

Posted in netflow configuration, Netflow Traffic Analysis on July 16th, 2014 by Joanne
Cisco EzPM NetFlow config: Easy Performance Monitoring

Do you have Cisco ASR1000 or ISR G2 routers?  Are you looking to get advanced NetFlow reporting from these routers, but the complexity of the Cisco Performance Monitoring configuration instructions is a show stopper for you?  Well, that changes with the Cisco EzPM NetFlow configuration by taking a very complicated task and truly making it “Easy Performance Monitoring”!

Read more »


Joanne Ghidoni
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,