All network traffic analytics
insider threats

What are insider threats? Challenges, indicators, & more explained

Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind...

network analytics

Network Analytics: What It Is, How It’s Used, and Who Benefits the Most

Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used...

endpoint protection FI

Endpoint protection isn’t enough: you need network traffic analytics

The recent SANs 2018 Survey on Endpoint Protection and Response makes clear that point-security solutions are not enough to quell the ever-growing barrage of...

context

Network Traffic Analytics with Gigamon

Quite some time ago, my colleague wrote about our Gigamon NetFlow support. That article will help you understand how to configure your Gigamon appliances...

adam

Integrating Threat Intelligence with Flow Data

Threat intelligence feeds help us keep our networks secure and our engineers informed on the latest issues. Huge volumes of this data get published...

jimd

More on Endpoint Visibility: Mobile Security and Your Network Security Strategy

Why should your endpoints be an important part of your network security strategy? Because even though they are out in the wild, endpoints are...

How to detect SSH credential misuse with network traffic analytics

According to a recent article on BleepingComputer, a backdoor Python library can steal SSH credentials. This can lead to ssh credential misuse if undetected by IT...

insider threats employees

How to Mitigate Insider Threats with Network Traffic Analytics

According to a recent Ponemon Institute report, the cost of insider-related breaches has escalated to over $8.7 million. What’s even more concerning is that...

Hourglass

How to Maintain a Secure Small Business Network (Even When You Work Alone)

Cybersecurity is never easy, but maintaining a secure small business network is arguably even harder because the IT team has much fewer staff. Even...

all your data is useless

All Your Data is Useless—Unless It’s Actionable

Here’s a scenario: you’re asked to provide a report of unnecessary high bandwidth usage on your network. So you open your network monitoring tool...