Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud over the last few years, and for good reason. The cost-saving benefit, ease of administration and space reduction are all good reasons to move your internal … [Read more...] about Scrutinizer SaaS Deployment
In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with our solution to correlate events with syslogs, DNS, IPAM, and cloud infrastructure logs. This blog will go a bit deeper on … [Read more...] about Best Practices in Network Forensics, Part II: Insider Threats
With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security and network professionals can monitor Intel AMT traffic using their existing flow and metadata collector. In this … [Read more...] about How to monitor Intel AMT traffic
Network Maps provide end-users with a high-level view of what their network topology looks like, as well as how traffic is flowing through your network. Most commonly, I see them used as a quick reference to determine if there’s any link saturation happening. … [Read more...] about Creating a Network Map
There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the days where we asked incessant strings of questions before our tired parents got us to stop. “Why, why, why?" This mindset helps answer … [Read more...] about Asking the Hard Questions: Why Analyze Network Traffic?
I feel comfortable saying that all of us know what encrypted data is. Web encryption, specifically, has been around for quite some time now. Secure Socket Layer (SSL) did take a long time to be considered widely adopted, however—twenty-two years, to be exact! … [Read more...] about Tracking Malware Hidden in Encrypted Traffic
Scrutinizer from Plixer is the recognized leader in metadata and NetFlow analysis and it just got even better! With the recent release of version 17.8, a large number of customer-requested enhancements and features have been included and I thought it would be … [Read more...] about Better Metadata and NetFlow Analysis
More than ever before, the applications installed on our hand held and laptop devices are sending data off to the cloud. This means the volume of traffic leaving the company is growing at a faster rate. The impetus behind this is the application developers … [Read more...] about Finding Blind Spots with Network Traffic Analytics
In an effort to protect national interests, many nations design and build warfare weapons to protect their assets and possible future plans. As part of this effort, they also need to make sure that they protect the blue prints of the economic plans, … [Read more...] about Governments and Vendors turning your network into a big data heist!
The volume of traffic on our networks in the last year has exploded. More than ever before we are seeing every kind of computer and handheld device make Internet connections to send information out of the company. IoT devices are some of the worst offenders of … [Read more...] about 2017: The Year of Massive Network Traffic Volumes