All

Identifying Compromised Hosts

Identifying a compromised host in your environment is a common task for administrators in most network environments.   What about other local hosts currently communicating...

NetFlow Report Integration

We frequently receive inquiries regarding the availability of APIs (Application Programming Interface) for our Advanced NetFlow reporting solution, so I’m going to expand upon...

SPAM NATION by Brian Krebs

Just finished the book: SPAM NATION by Brian Krebs. I received it after I had the opportunity to listen to him speak at the...

Role-based Access Control in Network Security

Role-based access control can provide security and business benefits by protecting the network and ensuring the integrity of intellectual property. Which both rate high...

Network Abuse and Policy Observance

I’m no network administrator, but I know that monitoring network abuse and policy observance is imperative to keeping a network safe.  After writing my...

Calculating Round Trip Time

Latency or Round Trip Time (RTT) was first introduced by Luca Deri. Due to its popularity, several vendors including Cisco, Riverbed, Plixer and others...

Tracking brute force Attacks

Tracking brute force attacks on your network can be a very time consuming process. It often ends up with you running around the office...

Cisco Software Defined Networking

Unlike a rigid OpenFlow deployment, Cisco Software Defined Networking (SDN) takes a more scalable approach to this paradigm shift in network connectivity. Although both...

Bluecoat NetFlow Support Recap

Over the last five years or so, I have noticed that one of the major topics we get requests for is Bluecoat NetFlow support....