All Uncategorized
jimd

Are you looking for an easier way to see how your VPNs are being used on your network? Here’s how to do it.

Who has the time, right? You might laugh but the truth is, in the past few weeks you have become the guru of everything...

Detecting VPN traffic on the network

Detecting VPN traffic on the network is a use case I hear daily from school systems ranging from primary schools all the way up through...

elgin

The strategic approach to network performance monitoring

When speaking with customers about what they need to support their infrastructure, the thing we hear most is “network performance monitoring.” This blog will...

stephent

4 must-have reports for network traffic analysis

Where do I start? We all end up asking ourselves this question as we dive into a new platform and a sea of new...

Reporting on Microsoft O365 with flow data

When thinking about extracting maximum value from network metadata such as Netflow, IPFIX, SFlow, etc., data enrichment becomes extremely important. ...

mikel

Windows 7 end of life is here: how to monitor Windows 7 traffic

Are you ready for the end? January 2020 it will come to an end. We all knew it was coming. But what now? Servers...

stephent

Better wireless impression tracking: how Scrutinizer correlates MAC ID, Token ID, RFID, and wireless metadata

If you use Cisco’s wireless solutions or Aruba Wireless, you already know how important impression tracking is. There are some strong IPFIX elements that...

jeffm

The importance of monitoring and correlating your wireless network traffic

I’m often asked, “if I already have a solution to monitor this segment of the network, why do I need a solution that will...

Gap analysis: the step-by-step guide for IT [with template]

If you need to meet a business or developmental goal, performing a gap analysis is a great way to illuminate how to reach that...