All Network Monitoring
joanna

5 ways of verifying security risks and avoiding false positives

I think I can safely assume that everyone knows the cautionary tale of the boy who cried wolf. If you don’t, the moral is...

joanna

Five ways Plixer Scrutinizer helps retail networks

Even though most of us have looked at a calendar recently and thought, “I could have sworn we were in May, not October,” you...

joanna

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies...

stephent

4 must-have reports for network traffic analysis

Where do I start? We all end up asking ourselves this question as we dive into a new platform and a sea of new...

How can data theft be prevented?

Corporate data theft is nothing new. In fact, according to a study conducted by McAfee, “ majority of IT professionals have experienced at least one data...

annam

Aruba IPFIX Support

These days, wireless networks support a mixed use of employees, guests, and vendors. Without adequate classification and prioritization of applications, companies risk reduced employee...

Disaster Recovery Monitoring

A question that I have been getting a lot recently is, “how can someone better their disaster recovery monitoring”. Tools that utilize SNMP are going...

Fortigate NetFlow Configuration

I was working with a customer a couple weeks back and wanted to share a sample Fortigate NetFlow configuration that we came up with....

Network Security: Detecting Malicious Traffic with NetFlow

Today, I want to discuss how you can use NetFlow for detecting malicious traffic on your network. With all of the recent malware outbreaks...

Monitoring failed login attempts with IPFIX

Does your network team routinely have issues with monitoring failed login attempts? If you answered “Yes” to the previous question or are interested in...