Where should I enable flow data?
The big boss had a conference call over the weekend. She sent a message to your boss’s boss, which trickled downhill, and eventually made its way to you in the form of a text message.
The big boss had a conference call over the weekend. She sent a message to your boss’s boss, which trickled downhill, and eventually made its way to you in the form of a text message.
When it comes to filtering network traffic, a scenario that appears simple in nature can be hard to accomplish at scale. Understanding top talker information or bandwidth trends isn’t really a problem for most traffic analysis solutions—the challenges I encounter revolve around: Proactive network monitoring Sifting through large amounts of data
There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the days where we asked incessant strings of questions before our tired parents got us to stop. “Why, why, why?” This mindset helps answer the question, “Why analyze network traffic?” The simplest …
Asking the Hard Questions: Why Analyze Network Traffic? Read More »
So you are thinking of delving into the world of Linux NetFlow Collectors, but do not quite know where to begin. Well we would like to help you with that. Before we get into the different solutions available, I have a few recommendations to keep in mind: First, while open source may come with the …
VMware IPFIX support and our IPFIX collector, Scrutinizer, give you visibility into the ‘cloud’. In this blog, I will show an example of a communication between two hosts (called tenants) on separate Virtual Machines. Read below, there’s nothing but blue skies.
Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is a requirement. With Scrutinizer and the intelligence behind Flow Analytics it is easy to detect reconnaissance-style traffic patterns like UDP scans. UDP scanning is common both on the Internet and internally. A common …
Now more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of IT employed by a financial institution. Improving computer security against cyber threats such as advanced persistent threats and DDoS are of paramount concern. In January, the Washington Post Reported: “The banks whose Web sites have been disrupted …
Xirrus IPFIX support provides network admins greater insight into what is going on out at the edge. Understanding which devices are creating the most traffic and types of traffic empowers admins to make optimizing tweaks to the networks overall configuration. Making sure that the critical applications receive priority is paramount.
We are very busy this week getting ready for CiscoLive! 2013 in Orlando next week. Since we have a first rate team getting us ready for the show, I had a block of time to put together three primary thoughts I’ve collected regarding mistakes some people make in their cyber threat detection routines.
We are excited to announce Scrutinizer v10 – our network traffic monitor with several new features. A few of which are listed below. New Mapping: Multiple connections from the same device, animated links (network ants), dependencies and a newer look and feel. Someone else will blog on these new maps as there is a lot …
Scrutinizer v10 Released: Network Traffic Monitoring Read More »