All Uncategorized
jake

Monitoring QoS for application troubleshooting

Network and security teams collect flow and metadata to provide an accurate account of applications traversing the network. Another aspect of troubleshooting poor application...

scottr NAT blog

Is there a way to track and locate a private host behind NAT routers?

A common question that has been coming up on product demonstrations over the last few weeks is, using NetFlow, is there a way to...

insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

jeff

Cisco ASR 1001-X overloading QFP

Whether you work primarily on the networking side of the house or the security side, you’ll need to ingest metadata into at least one...

elgin

SD-WAN visibility: key KPIs that enterprises identify

As enterprises seek to expand 5G/LTE or MPLS networks, they must set SLAs. Inside of those SLAs, key performance indicators (KPIs) drive the progression...

fintech

Fintech is making traditional financial services obsolete

When my wife and I were looking to renovate our garage and landscape the yard, we went online to check our options for financing...

How to Strategically Plan an IT Budget

How to Build a Strategic IT Budget and Get the C-Suite to Recognize Your Value

IT budgets require a lot of thought, but the process of planning, organizing, and presenting your budget doesn’t have to be painful. In fact,...

scott

How to Set Up Enhanced Wireless Network Visibility

It has been several years since Cisco introduced wireless NetFlow support on their Wireless LAN Controller (WLC) platforms. Using the Application Visibility and Control...

How to protect your organization against email spoofing

We’ve all come across spoofed emails at some point, and they are a real threat to the security and safety of our organizations and...

jimd

Wireless Network Visibility Using NetFlow

This month I was working with a customer who was having a hard time understanding what AP MAC was being reported by Scrutinizer when...