With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security and network professionals can monitor Intel AMT traffic using their existing flow and metadata collector. In this … [Read more...] about How to monitor Intel AMT traffic
Network Maps provide end-users with a high-level view of what their network topology looks like, as well as how traffic is flowing through your network. Most commonly, I see them used as a quick reference to determine if there’s any link saturation happening. … [Read more...] about Creating a Network Map
There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the days where we asked incessant strings of questions before our tired parents got us to stop. “Why, why, why?" This mindset helps answer … [Read more...] about Asking the Hard Questions: Why Analyze Network Traffic?
I feel comfortable saying that all of us know what encrypted data is. Web encryption, specifically, has been around for quite some time now. Secure Socket Layer (SSL) did take a long time to be considered widely adopted, however—twenty-two years, to be exact! … [Read more...] about Tracking Malware Hidden in Encrypted Traffic
Scrutinizer from Plixer is the recognized leader in metadata and NetFlow analysis and it just got even better! With the recent release of version 17.8, a large number of customer-requested enhancements and features have been included and I thought it would be … [Read more...] about Better Metadata and NetFlow Analysis
More than ever before, the applications installed on our hand held and laptop devices are sending data off to the cloud. This means the volume of traffic leaving the company is growing at a faster rate. The impetus behind this is the application developers … [Read more...] about Finding Blind Spots with Network Traffic Analytics
In an effort to protect national interests, many nations design and build warfare weapons to protect their assets and possible future plans. As part of this effort, they also need to make sure that they protect the blue prints of the economic plans, … [Read more...] about Governments and Vendors turning your network into a big data heist!
The volume of traffic on our networks in the last year has exploded. More than ever before we are seeing every kind of computer and handheld device make Internet connections to send information out of the company. IoT devices are some of the worst offenders of … [Read more...] about 2017: The Year of Massive Network Traffic Volumes
We recently had the opportunity to work with an exciting Juniper IPFIX MX Series export. It provides traffic details that we haven't seen before from this vendor. The export is available in release 14.1X55 and release 17.1 in Q1 2017, but you also need the … [Read more...] about Juniper MX IPFIX Reporting
So you are thinking of delving into the world of Linux NetFlow Collectors, but do not quite know where to begin. Well we would like to help you with that. Before we get into the different solutions available, I have a few recommendations to keep in mind: … [Read more...] about Linux NetFlow Collector