All threat detection
elgin

Support criteria for SD-WAN vendors

As OEMs continue to invest in WAN optimization, what differentiates vendors’ capabilities so that enterprises seek to scale their infrastructure? In this blog, we’ve...

Dark DDoS: Masked Data Exfiltration

I was attending the 12th annual NC InfoSeCon conference back in October and in one of the presentations, the speaker mentioned Dark DDoS attacks....

Indicator Of Compromise and Detection

Our network admin was made aware of a possible phishing email attack and at the same time reminded of the need for constant internal...

Security Professionals Love NetFlow and IPFIX

It has never been more dangerous to maintain your company’s on-line presence.  If your company security perimeter is breached, what should you do?  We...

Cisco ASA Internet Threat Defense Solution Webcast

In our February 14th webcast, we will present how the Cisco ASA NSEL exports are used to detect network threats that could be missed...

Internet Threat Defense Solution: Part 1

Building organization confidence surrounding a company’s Internet threat defense effort means we can never let our guard down.  A potential internet security threat could...

How to avoid IPFIX or NetFlow Sampling Vs. sFlow

Sampling traffic in an effort to represent the overall traffic pattern in theory is a sound idea.  In fact, for the most part, I...