All

SD-WAN Vendors

A few weeks ago, I spent four days at CiscoLive 2016 in Las Vegas. If you’re curious, we posted a bunch of photos from the...

How to Recognize a Voice Phishing Attempt

Not all phishing attempts come in through your email. Has someone ever called you to offer you a free vacation, or to ask you...

Cisco ASA NetFlow Configuration using ASDM

Over the past few weeks I have taken a number of support calls from customers who were looking for some assistance with their Cisco...

Cisco NBAR Best Practices for Custom Protocol Reporting

As a company reporting on just about all unique flow exports found in the world, we run into nearly every issue probably thought possible. ...

APCON Netflow Support

Recently some customers questioned if we provide APCON netflow support. APCON, a company headquartered near Portland, OR, develops innovative, scalable technology solutions to enhance...

Find Pokemon GO Network Traffic with NetFlow

Monitor Pokemon Go Network Traffic So there I am monitoring my network with NetFlow and a wild application appears! Pokemon GO hit the scene...

Malware Detection: Determining the cause

Malware Detection and determining the cause of an incident is a requirement in todays connected world. The post U.K. Parliament’s computers tried to access porn...

Cisco IWAN Training

One of the biggest questions being asked of IT professionals is, “Are we using our bandwidth to its fullest potential”? Of course we have...

NetFlow DPI Category

If you are a vendor looking to export IPFIX from your appliance, you should know that a big selling feature for you to differentiate...