When One Packet Stream Needs to Feed Five Tools
In most environments today, one packet stream rarely serves a single purpose. Let’s say a SPAN or ERSPAN session mirrors traffic from a core switch. That same stream may ...
Read MoreInsights, updates, and technical deep dives from our team
In most environments today, one packet stream rarely serves a single purpose. Let’s say a SPAN or ERSPAN session mirrors traffic from a core switch. That same stream may ...
Read More
Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers
Read MoreWhether your company has 50 employees or 50,000, someone somewhere in the next 60 days will bring malware into
Read MoreIt has never been more dangerous to maintain your company’s on-line presence. If your company security perimeter is breached,
Read MoreDo you have a solution in place for detecting network threats? If you say no, you are not alone.
Read MoreNow more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of
Read MoreIn this blog, I will be continuing Part 1 of the “What is Flow Analytics™?” Series. In this blog I
Read MoreUsername NetFlow Reporting is a hot topic since the Cisco Visual Networking Index (VNI) report in late May. By 2016,
Read MoreOften these days, we’re asked for a general rule of thumb or guidelines that can help with calculating NetFlow
Read MoreI came across this article in infosecisland.com on Securing PCs posted by Michelle Drolet who is the founder and
Read MoreBusinesses with IT Teams managing tens of thousands of IP addresses often find it more difficult to track down
Read More