All Network Operations
bobn

NetOps and SecOps Collaboration Benefits the Business

Not only have NetOps and SecOps teams historically been separate, but they have often seen each other as impediments to getting their own jobs...

Large Scale NetFlow Collection

When an enterprise is ready to move beyond basic flow collection to large scale NetFlow collection, there are several features that should be taken...

jeff

Tracking Malware Hidden in Encrypted Traffic

I feel comfortable saying that all of us know what encrypted data is. Web encryption, specifically, has been around for quite some time now....

amazonaws blog

Why is My Computer Connecting to amazonaws.com?

Did you know that ignorance is bliss? When I was in school, I didn’t think about cybersecurity at all, and had a devil-may-care approach...

bobn

5 Prevalent SIEM Problems and How NetFlow Collector Integration Solves Them

Security Information Event Management (SIEM) platforms began to gain mainstream attention and adoption around 2008. SIEM promised to simplify and improve security as an...

brian

A Comprehensive List of Cisco NetFlow Capable Devices

Is my Cisco hardware NetFlow compatible? If you follow the news, you know that there has been a big spending spree by Cisco with...

annam

Aruba IPFIX Support

These days, wireless networks support a mixed use of employees, guests, and vendors. Without adequate classification and prioritization of applications, companies risk reduced employee...

How to monitor FTP traffic with NetFlow

In my last post, I discussed how to monitor SSL traffic. Today, I thought I would continue down the road of traffic monitoring by...

scott

How to Detect ICMP Tunneling

Are you aware of any data tunneling that might be occurring in your network? Do you think that your network is totally secure? If...