All Network Traffic Analysis
briand

Where should I enable flow data?

The big boss had a conference call over the weekend. She sent a message to your boss’s boss, which trickled downhill, and eventually made...

briand

How to Filter Network Traffic

When it comes to filtering network traffic, a scenario that appears simple in nature can be hard to accomplish at scale. Understanding top talker...

critical thinking

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...

Linux NetFlow Collector

So you are thinking of delving into the world of Linux NetFlow Collectors, but do not quite know where to begin. Well we would...

VMware IPFIX Support

VMware IPFIX support and our IPFIX collector, Scrutinizer, give you visibility into the ‘cloud’. In this blog, I will show an example of a...

Internet Threats: UDP Scans

Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is...

Banking Internet Security

Now more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of IT employed by a financial...

Xirrus IPFIX Support

Xirrus IPFIX support provides network admins greater insight into what is going on out at the edge. Understanding which devices are creating the most...

Three Mistakes When Performing Cyber Threat Detection

We are very busy this week getting ready for CiscoLive! 2013 in Orlando next week.  Since we have a first rate team getting us...

Scrutinizer v10 Released: Network Traffic Monitoring

We are excited to announce Scrutinizer v10 – our network traffic monitor with several new features.  A few of which are listed below. New...