All
users are the weakest link

“Users are the weakest link” is an excuse

Users are the weakest link. How many times have you heard that? Better question, how many times have you said it yourself? We can...

mikelp

Internet Use Policies: Do Your Employees Even Know What is Acceptable?

I bet you’ve ordered something online at work. It may have been pizza for your lunch or flowers for Mother’s Day (…the day before—hey,...

joanna

Ixia IPFIX Reporting and Analysis

Recently, we decided to deploy an Ixia CloudLens instance in our lab to see what we could report on using Ixia’s IPFIX. Once I...

You can’t stop Malware claims Yahoo CEO

Despite the hundreds of billions spent by companies over the last several years, malware continues to infect our networks, sabotage our systems and steal...

scottr

Configuring Flexible NetFlow to Monitor Network Activity

Over the past few weeks, I have taken a number of support calls from customers who were looking for help with their Cisco router...

annam

How to Configure NetFlow on Cisco UCS via GUI

Today, I will be talking about Cisco UCS NetFlow configuration via GUI, including its limitations and differences compared to the configuration via CLI. I...

microphone

There Are A Thousand Apps Listening

Let’s consider a hypothetical scenario. An entity you know nothing about has the power to listen to everything you say, and you have no...

How to monitor Intel AMT traffic

With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security...

briand

How to Integrate Grafana with NetFlow

UPDATE: A new version of documentation is available here. This week I have had a few customers ask how to integrate Grafana with NetFlow...