All
jimd

Network Security: Using Dashboards to Aid Your Investigation

In my last post, titled Network Visibility: Using Dashboards to Tell a Deeper Story, we discussed how the dashboard feature of Scrutinizer can be...

The IT Pro’s Guide to Super Effective Patch Management

Although it ought to be a basic task, patch management has nearly gotten out of control. Many vendors, to their credit, are quick to...

jeff

Cisco Catalyst 9500 Flexible NetFlow Configuration

Recently I’ve had many requests from customers who upgraded to the Catalyst 9500 series and are looking for a NetFlow configuration document. So I’ve...

Creating a secure IoT environment

With global IoT product adoption continuing to grow, many organizations are trying to tackle the challenge of allowing these devices in while maintaining a...

traci

Deploying Scrutinizer in Azure

I’ve heard Azure used quite a bit lately as a place to host and manage virtual machines. Azure launched console access in March of...

jeff

Configuring an ERSPAN within VMware and Cisco Switches

With the ever-growing support for flow exports, the need for probes and port mirroring has become a lot more limited. There are certain environments...

joanna

How to Configure Meraki for SNMP Polling

SNMP, also known as Simple Network Management Protocol, can be a network admin’s best friend. With the ability to pass SNMP information to other...

elgin feature

Why ERSPAN is Important for Network Security

Enterprises are seeking a secure monitoring solution that performs encapsulation. Encapsulated Remote SPAN (ERSPAN) identifies visibility gaps and vulnerabilities, but using it enables flow...

The dangers of IoT devices and what you should know

IoT devices are dangerous! Now, I know what you are thinking, “Justin, IoT devices provide convenience and make many mundane parts of life so...