All network security

Context-aware security

According to Gartner, when it comes to context-aware security, the most commonly cited context types are location and time. However, there are multiple types...

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...

Data Exfiltration over DNS

How many companies out there are monitoring DNS traffic? Are you concerned about data exfiltration over DNS? How many people even know that is...

Arista sFlow Configuration

Lately I’ve spoken to a few people in the field that are using Arista switches to get visibility into their networks using sFlow and...

Identifying Compromised Hosts

Identifying a compromised host in your environment is a common task for administrators in most network environments.   What about other local hosts currently communicating...

Flexible NetFlow: NBAR NetFlow configuration

Did you ever consider that using Flexible NetFlow, specifically an NBAR NetFlow configuration, could provide another aspect of network security for you? Exporting NBAR...

Network Security: Detecting Malicious Traffic with NetFlow

Today, I want to discuss how you can use NetFlow for detecting malicious traffic on your network. With all of the recent malware outbreaks...

Detecting Network Scans using NetFlow

As a continuation of our Network Security series, I wanted to write a blog on detecting network scans using NetFlow and IPFIX.  Since a...

NetFlow Security: Detecting IP Fragmentation Exploits with Scrutinizer

Continuing with our series on network security monitoring with NetFlow, I’d like to discuss a strategy for detecting IP fragmentation attacks with Scrutinizer. The...

Monitoring failed login attempts with IPFIX

Does your network team routinely have issues with monitoring failed login attempts? If you answered “Yes” to the previous question or are interested in...