All
elgin feature

Why ERSPAN is Important for Network Security

Enterprises are seeking a secure monitoring solution that performs encapsulation. Encapsulated Remote SPAN (ERSPAN) identifies visibility gaps and vulnerabilities, but using it enables flow...

The dangers of IoT devices and what you should know

IoT devices are dangerous! Now, I know what you are thinking, “Justin, IoT devices provide convenience and make many mundane parts of life so...

jake

Real-Time DDoS Detection & Analysis

DDoS attacks have plagued the network security space for almost 20 years. In that time, we have seen a lot of changes. In just...

briand

Cisco ASA Access List Reporting

If you are ever out to dinner with friends talking about which network devices have the strangest exports, the Cisco ASA will certainly be...

annam

The Top 7 Network Security Predictions for 2019

After you celebrate New Year’s Eve, it is time to get to work on those New Year’s resolutions! It is also a good time...

scottr

Using Host Indexing to Investigate IP Addresses

I want to introduce you to a very cool, very powerful search function for investigating IP Addresses. We talk all the time about how...

IoT in Healthcare: Managing The Opportunity & The Risk

It’s an exciting time in medicine. Technology is constantly making healthcare more accessible, more precise, and more convenient. For instance, IoT in healthcare can...

holidays

Securing the network from new devices

It’s that time of year again. Employees have gone away from the office to spend time with friends and family. They will, of course,...

tcp flags

Using TCP Flags with NetFlow

NetFlow can give us all kinds of rich information about our network infrastructure. You’ll find standard fields with information like source and destination and...