In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and policy makers, and what happens to your private health information when a pharmacy is acquired.Read more
We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies are allowing more employees to work remotely, VPN security is a greater concern and there is a growing need to monitor VPN tunnels.Read more
Almost every organization is equipped with VPNs to support a remote workforce these days. Often, secure VPNs use a no-split secure tunnel, tunneling all remote workstation traffic through the security control the business has supplied. A less secure VPN option is a split-tunnel. With this method, non-business traffic routes normally within the remote network, but often with less security.
Detecting VPN traffic on the network is a use case I hear daily from school systems ranging from primary schools all the way up through large universities. One of the biggest concerns for a security or network engineer is tracking potentially unwanted traffic on the network. This could be something harmless but forbidden like video games, or a major threat like the latest APT that was just uncovered. This is why we implement strict ACLs and segregated VLANs on the network, and why we look at things like Deep Packet Inspection (DPI) as well as SSL DPI to help us gain insight into encrypted traffic. This blog aims to go over a couple technologies you probably already have at your fingertips and how you can use IPFIX/NetFlow analytics to track this nefarious behavior.
Are we properly utilizing these expensive WAN links? That is probably a question you have asked yourself on more than one occasion when you get a bill from your provider. While MPLS/Broadband connectivity both have pros and cons, wouldn’t it be great if you had a tool to see if they were properly being utilized or if load is increasing over time? How about rather than just seeing in/out bits/s, you could determine what application is consuming the link? Stay tuned and see how it works!
When exploring how digital advertising affects users on a daily basis, you may wonder what solutions are in place to monitor complex systems in real time. Think of searching for the latest Apple iPhone: it only takes this one search and then you’ll get iPhone ads in your email and in between your daily search for other items. This is called adtech and it focuses on a targeted demographic or subject through direct advertising. This blog explores adtech, but first we need to understand how the adtech ecosystem works.Read more
We all know that VPN monitoring is something every network and security engineer should be familiar with, but with the recent uptick of changes in companies work-from-home policies, IT departments are struggling to scale up to the VPN demands. Let’s be 100% honest about this: most networks weren’t designed to handle the demand we are seeing right now.
When speaking with customers about what they need to support their infrastructure, the thing we hear most is “network performance monitoring.” This blog will share my insight on what is network performance monitoring, tools utilized, and methods to use Scrutinizer for monitoring network performance.Read more
More and more people are working from home. Now, organizations need a way to understand the role a remote workforce plays in their network performance and security posture. Fortunately, with network traffic metadata, organizations can easily monitor VPN traffic, whether it’s through a split tunnel or no-split tunnel.Read more
RSA 2020 was last week and like every year I have attended, there was a whirlwind of new technologies and methodologies being presented by the vendors I spoke with. Continue on to see what things we learned and how Plixer can help solve problems facing today’s customers.Read more