All Network Behavior Analysis

Internet Threats: UDP Scans

Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is...

Malware Incident Response System

Whether your company has 50 employees or 50,000, someone somewhere in the next 60 days will bring malware into your network. When it happens,...

Security Professionals Love NetFlow and IPFIX

It has never been more dangerous to maintain your company’s on-line presence.  If your company security perimeter is breached, what should you do?  We...

Detecting Network Threats

Do you have a solution in place for detecting network threats?  If you say no, you are not alone.  Or maybe you have firewalls...

Banking Internet Security

Now more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of IT employed by a financial...

Cisco NetFlow | Part 2 – What is Flow Analytics™?

In this blog, I will be continuing Part 1 of the “What is Flow Analytics™?” Series. In this blog I will be going over what...

Username NetFlow Reporting

Username NetFlow Reporting is a hot topic since the Cisco Visual Networking Index (VNI) report in late May. By 2016, Cisco’s forecast predicts that there...

Calculating NetFlow Volume

Often these days, we’re asked for a general rule of thumb or guidelines that can help with calculating NetFlow Volume.  How much disk space...

12 Vulnerabilities is the Average for a given PC : Detect Network Threats

I came across this article in infosecisland.com on Securing PCs posted by Michelle Drolet who is the founder and CEO of Towerwall. In the...

Identity-Aware NetFlow: Cisco ASA NSEL

Businesses with IT Teams managing tens of thousands of IP addresses often find it more difficult to track down IP addresses and for this...