All
annam

How to Enable Cisco TrustSec NetFlow

As I was visiting customers onsite last week, a few of them asked me if we support Cisco TrustSec NetFlow exports. Of course, we...

scottr

Palo Alto Networks: NetFlow Reporting and Username Correlation

A few years ago, I wrote a blog that talked about how our Palo Alto NetFlow reporting allows network administrators to easily identify traffic...

adam

How to Gain Visibility into CGNAT

In today’s world of connected refrigerators, thermostats, cars, and phones, IP addresses are in high demand. IPv6 was invented to solve this problem, but...

mikelp

4 Tips on How to Set Up Scrutinizer for Maximum Efficiency

When supporting a product, you often hear patterns across the support cases you take. Today, I wanted to give you a short list of...

facebook like button

Protecting your organization from social media breaches

In a recent data breach, Facebook said hackers gained access to nearly 50 million accounts in what amounts to the largest-ever security breach at...

Protecting customer data after bankruptcy

On Protecting Customer Data: What Happens After Bankruptcy?

In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data...

jimd

Three Strategies to Catch and Stop Insider Threats

Earlier this year I worked on a document that addressed some of the common misconceptions about Scrutinizer. One of the subjects that caught my...

jeff

NetOps and SecOps Collaboration Solves the Data Silo Problem

In the IT space we are not new to challenges. Some might even say we welcome them and thrive in overcoming hurdles. Each and...

traci

Gigamon NetFlow Configuration From Command Line

Gigamon has a web interface called GigaSMART that it uses to configure NetFlow on Gigamon devices. But GigaSMART can be limiting; through working with...