All

Cyber Incident Response Plan (Part 1)

The value of your cyber incident response plan becomes stronger as various global incidents unfold.  Just today, I was going through my news feeds and...

Cisco ISE NetFlow Integration

Are you looking for Cisco ISE NetFlow integration? We have this working with both Cisco ISE v1.2 and v1.3. In the past, we have...

Cisco Catalyst 2960-CX/3560-CX NetFlow Configuration

The Cisco Catalyst 2960-CX/3560-CX Series Switches are the next generation of the world’s most widely deployed access switches, providing Layer 2 and Layer 3...

Detecting Tor Traffic

Detecting TOR traffic will help identify possible infections on your network. It keeps the eyes of your network team open to different types of...

Username Reporting with Netflow

I have had a few customers ask about username reporting with Netflow within their incident response system. Collecting user activity and viewing reports filtered...

Building your incident response team

What do you normally do when you find an infected machine on the network? if you don’t have a good answer to that question...

Procera IPFIX Support

In a previous Procera IPFIX blog I talked about the security benefits  gained from collecting their IPFIX flow exports, and how using IPFIX flow...

Layered security approach (is only as good as ….)

A layered security approach for detecting malware cyber-attacks is the current “go-to” way to defend both network perimeters and individual endpoints.  But layered security...

Cisco ISE vs Forescout CounterACT

Recently, we tested Cisco ISE vs Forescout CounterACT. We have implemented and integrated our Incident Response System with three different authentication systems like this...