All

VXLAN Monitoring; SDN and VDC

As companies continue to move to software defined networks (SDN) and cloud computing, the need for detailed and accurate VXLAN monitoring will continue to...

How to monitor VoIP Traffic

This blog aims to do one thing, show you how to monitor VoIP traffic on your network. I get questions, almost daily, asking, “How...

Identifying and Managing Shadow IT in the Enterprise

Many devices that are placed on the corporate networks can fly under the radar of the IT departments watchful eye. These devices include smart...

Fortinet IPFIX Support

Did you know there is Fortinet IPFIX support on their FortiSwitch-1000 switch?  The other day I was working with a customer who mentioned configuring...

Detecting Network Threats

Do you have a solution in place for detecting network threats?  If you say no, you are not alone.  Or maybe you have firewalls...

Incident Response Plan for Cyber Attacks: Part 2

This is part 2 of a two part post on Incident Response Plan for Cyber Attacks. The other post left off at listing the...

MikroTik NetFlow Support

MikroTik NetFlow support and configuration is a two-step process that can be achieved in a Command Line Interface (CLI) or a Graphical User Interface...

Incident Response Plan for Cyber Attacks: Part 1

The Incident Response Plan (IRP) for Cyber Attacks outlines a fast, orderly and effective process for dealing with suspected computer related intellectual property theft....

Cisco ASA NetFlow Reporting

In this blog I will go over Cisco ASA NetFlow reporting and how it has changed in V8.4.7+/9.1.4.1+. If you have a Cisco ASA on your...