All
jeffs

IoT security and your network

The Internet of Things (IoT) market is booming. Gartner predicts that 5.8 billion IoT endpoints will be in use in 2020, marking a year-over-year...

endpoint security

Endpoint security explained: challenges and best practices for businesses

If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...

mikel

Windows 7 end of life is here: how to monitor Windows 7 traffic

Are you ready for the end? January 2020 it will come to an end. We all knew it was coming. But what now? Servers...

stephent

Better wireless impression tracking: how Scrutinizer correlates MAC ID, Token ID, RFID, and wireless metadata

If you use Cisco’s wireless solutions or Aruba Wireless, you already know how important impression tracking is. There are some strong IPFIX elements that...

jimd

Building a geo attack map with the Scrutinizer API: part 2

So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting....

jeffm

The importance of monitoring and correlating your wireless network traffic

I’m often asked, “if I already have a solution to monitor this segment of the network, why do I need a solution that will...

traci

How to set up AWS S3 bucket reporting in Scrutinizer

I recently worked with a customer who wanted to report on AWS flow logs within Scrutinizer. Scrutinizer requires only a bit of information in...

Gap analysis: the step-by-step guide for IT [with template]

If you need to meet a business or developmental goal, performing a gap analysis is a great way to illuminate how to reach that...

jake

Monitoring QoS for application troubleshooting

Network and security teams collect flow and metadata to provide an accurate account of applications traversing the network. Another aspect of troubleshooting poor application...