All
jimd

Network Visibility: Using Dashboards to Tell a Deeper Story

When it comes to network traffic monitoring, a single and unified view of your networking infrastructure is essential in ensuring that your environment is...

retail security

Securing your retail business during the holidays

With mere days until Hanukkah and less than a month before Christmas, retail organizations are starting to see a spike in online and in-store...

The Network Layers Explained

The Network Layers Explained [with examples]

In computer science, the concept of network layers is a framework that helps to understand complex network interactions. There are two models that are...

traci feature

Gigamon IPFIX Configuration from Command Line

Gigamon uses GigaSMART for most of its NetFlow configurations, but some of us just love working from within a CLI. With a bit of...

joanna

How to Configure Cisco AnyConnect to Send Flow Data

Most companies have a VPN set up to allow users remote access to the company network, but that leaves a blind spot on the...

jake

Scrutinizer AMI Deployment Guide

Being on the pre-sales side of the house, I hear about a lot of upcoming projects for a variety of different companies and verticals....

briand

How to Filter Network Traffic

When it comes to filtering network traffic, a scenario that appears simple in nature can be hard to accomplish at scale. Understanding top talker...

threat surface

How to reduce your IoT threat surface

Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices like IP cameras, and it...

network analytics

Network Analytics: What It Is, How It’s Used, and Who Benefits the Most

Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used...