All General

Cisco ASA FireSIGHT Integration

UPDATE 8/9/17: We have written a more recent blog on this topic, which can be found here. Back in February at CiscoLIVE! in Berlin Germany...

Global Network Map | Google Map Integration

In an industry that is ever growing and becoming more and more spread out worldwide, it has become a network professionals responsibility to manage...

LogPoint NetFlow Support

Our support team recently received a request for LogPoint NetFlow integration. Just as we confirmed with the other SIEM integrations, NetFlow, IPFIX, and syslog...

How Fast Do PoS Attacks Happen?

Earlier this week, one of our customer service managers shared a video that captures three men placing a card skimmer on a store machine....

DNS Firewall : Free Update to Bind

Recently we went through an exercise which turned our DNS into a firewall for a well-maintained list of requested hostnames.  It was designed to...

Flow Replicator Vs UDP Forwarder

Recently a customer called in asking about our UDP Forwarder.  At first I wasn’t sure what they were talking about but, as they explained...

Monitoring the Internet of Things

The “Internet of Things” is a buzz phrase that has been thrown around a lot in the last few years. With more and more devices...

Does the FBI iPhone Hack Fall Under Ethical Hacking?

The Federal Bureau of Investigation recently cracked a locked iPhone in order to procure evidence against one of the San Bernardino shooters.  Now, the...

Juniper MX240 IPFIX Support | Direction Problems

The other day I was helping an engineer who was trying to provide some Juniper MX240 IPFIX support when we ran into some “flow...

Why Is My Computer Connecting to Akamai Technologies?

Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications.  It’s a huge headache, because...