All Network Operations

Why Is My Computer Connecting to Akamai Technologies?

Once in a while, I perform a cleanup of my personal computer that involves removing unnecessary and unwanted applications. It’s a huge headache, because...

Context-aware security

According to Gartner, when it comes to context-aware security, the most commonly cited context types are location and time. However, there are multiple types...

Support for KVM Virtual Appliances

There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such...

Application Performance Management

Once, the idea of knowing what applications are running on your network and knowing the application performance of each of them was only a...

Detecting BitTorrent Traffic

With all of the new movies and TV shows right around the corner, I figured it would be a good time to talk about...

VMware DFW IPFIX Support

The VMware DFW (Distributed Firewall) is part of the NSX feature set and provides a way to manage which connections are permitted or denied...

VMware IPFIX Support

VMware IPFIX support and our IPFIX collector, Scrutinizer, give you visibility into the ‘cloud’. In this blog, I will show an example of a...

Cisco ASR 9000 Configuration NetFlow Guide

One of the best parts about working in Tech Support for a company that analyzes NetFlow, is that I get the opportunity to work...

Configure a mirror port in VMware

Today, I’d like to walk you through the process to configure a mirror port in VMware’s VSphere.  After you’ve deployed your new FlowPro Virtual...

Telesoft NetFlow Generation

NetFlow generation is going to bigger lengths to make sure it scales with the large amounts of bandwidth being generated by today’s networks. High-performance...