All

Context-aware security

According to Gartner, when it comes to context-aware security, the most commonly cited context types are location and time. However, there are multiple types...

NetFlow Deduplication or Flow Deduplication

The business of NetFlow Deduplication (aka Flow Deduplication) during collection time faces an interesting paradigm. It revolves around enterprise NetFlow collection and scalability. This...

Support for KVM Virtual Appliances

There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such...

Use Your Surveillance Cameras to Investigate Malware

If you suspect a malware breach and want to investigate the history of a specific host, how do you do it? For most of us, the...

Application Performance Management

Once, the idea of knowing what applications are running on your network and knowing the application performance of each of them was only a...

Detecting BitTorrent Traffic

With all of the new movies and TV shows right around the corner, I figured it would be a good time to talk about...

VMware DFW IPFIX Support

The VMware DFW (Distributed Firewall) is part of the NSX feature set and provides a way to manage which connections are permitted or denied...

VMware IPFIX Support

VMware IPFIX support and our IPFIX collector, Scrutinizer, give you visibility into the ‘cloud’. In this blog, I will show an example of a...

Saisei IPFIX Support

Managing a network without having the necessary tools for visibility and control is similar to playing Russian roulette. You know a problem is going to...