All
elgin

SD-WAN visibility: key KPIs that enterprises identify

As enterprises seek to expand 5G/LTE or MPLS networks, they must set SLAs. Inside of those SLAs, key performance indicators (KPIs) drive the progression...

cybersecurity roundup Q

Q2 roundup: 13 interesting articles on cybersecurity news & expert opinions

Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. Once again, I’ve gathered...

jake

How to streamline your network monitoring workflows with API integrations

In this industry, I’ve seen a common trend of buying best-in-breed solutions that are built for one or a few things instead of the...

briand

Integrate Grafana and Scrutinizer—reprise

Companies today seem to be screaming for easy access to time series data, and there are a few rising stars in the space—notably Grafana...

annam

How to monitor for a targeted data breach with NetFlow

Estimates show that 1 in 4 organizations will experience data loss of more than ten thousand records within the next twenty-four months. Without the...

scott

Cisco Catalyst 9400 NetFlow configuration

I am seeing a lot more of the Cisco Catalyst 9400 switches at my customer sites these days. I have also had a number...

adam

IPFIX reporting with F5 Big-IP (part 1)

Modern networks are designed to provide fast and reliable access to the applications that make us productive. Maybe it’s the inventory system used to...

mikel

Expanding Scrutinizer’s disk: how to add more storage to your deployment

So you have added storage to your fresh Scrutinizer deployment. Or you’re giving your existing Scrutinizer deployment extra space. If you add a second...

feature image

Flow protocols in real-world environments

Over the years, libraries have been filled on the topic of flow protocols—specifically, how they work and their general accuracy....