Michael Patterson : Advanced NetFlow Traffic Analysis
Michael Patterson
Founder and Product manager for Plixer's Scrutinizer NetFlow and sFlow Analyzer as well as Flow Analytics.

WannaCrypt proactive measures with NTA

In an effort to help protect our company and our customers’ from wcrypt, we documented in this post a series of steps...

Full Story »

The Rise of AI in Communications

Data, Data everywhere but not a byte to thinkData, Data everywhere buy why are the bytes not linked? As economical compute power...

Full Story »

ITW - Will There Ever Be A Return To The Good Ol' Days?

International Telecoms Week (ITW) is where all the interconnect carriers come to work out minutes exchange pricing and routes.   Dialogic has had a...

Full Story »

What The U.S. Tax Code can Learn From Ransomware

U.S. citizens in Little Rock Arkansas pay the same federal income tax as those in New York and Beverly Hills - even...

Full Story »

Like Cars in the 1950s

Did you know that from 1920-1960 there were hundreds of US auto manufacturers? Then it collapsed to just 5 - Ford,...

Full Story »

The Red Velvet Rope

Popular nightclubs have a red velvet rope next to the line outside. Outback Steakhouse did better when there was a line...

Full Story »

Is It Over for SMS?

According to some research from the GSMA, all is not lost with the SMS battle against the IP messaging services. With WhatsApp, Facebook...

Full Story »
Archives of all blog posts:
WannaCrypt proactive measures with NTA
Implementing the NIST Framework for Improving Cyber security
Threat Investigations Suffering from Lack of Context
A Massive Wave of Cybercrime Coming
DNS Firewall
Security Analytics - Network as a Sensor
Cisco Cyber Threat Defense : 4 Tell-Tale Signs of Data Exfiltration
Phishing Attack Training
Cisco nvzFlow Reporting
Splunk NetFlow Support : Vendor Comparison
Software Defined Network: 8 BIG Benefits
IPFIX Flow Direction and Packet Counters
Monitoring DNS Traffic for Security Threats
Building an Incident Response Team: 4 Specialties
How To Investigate Malware
Riverbed NetFlow Analyzer
NetFlow Calculator for Supermen!
Software Defined Networks Demystified: 5 Truths
Cisco AVC Reporting: Flexible NetFlow Configuration
Configuring Citrix AppFlow Support
Palo Alto NetFlow Configuration
Been Hacked - What will you do?
Cisco AVC Webcast - Future Proof your Network
UserName with NetFlow or IPFIX
AKCP Reseller : AKCP Distributor
Securing Remote Networks Against Cyber Threats: part 2
Securing Remote Networks Against Cyber Threats: part 1
Router Overhead When Enabling NetFlow
Cisco Wireless Controller NetFlow Configuration
Building a NetFlow Cache: Exporting IPFIX
Amazon EC2 Monitoring: Network Performance
Enterasys Dragon: Intrusion Prevention System Log Analysis
Next Generation Firewalls with Application Performance Monitoring In Mind
Palo Alto Networks NetFlow Export includes Firewall Event Field in PAN-OS 5.0
IPFIX Vendors should implement RFC 5610
Log Management Solutons
Nimsoft Service Desk Pricing: Distributed NetFlow Solutions
NetFlow Training Seminar: NetFlow University
NetFlow Training Schedule for 2012
Flexible NetFlow Configuration example for Performance Monitoring for TCP, VoIP and Cisco NBAR
Ingress NetFlow or Egress NetFlow part 2
Ingress NetFlow or Egress NetFlow part 1
Cloud Service Monitoring
Temperature Monitoring Solutions with Remote Humidity Sensors
Cisco ASA Vs. Juniper SRX: NetFlow Reporting
How to roll out BYOD Security: Best Network Management
Detecting Advanced Persistent Threats with NetFlow and IPFIX
Monitoring BYOD traffic with NetFlow
Migrating to Flexible NetFlow : BEST PRACTICES
Monitoring Video Performance with NetFlow
End to End Visibility : Network Flow Path
Dropped NetFlow : Flow Sequence Numbers
Email Monitoring Software: Email Reporting
NetFlow Behavior Analysis Systems : Limited Impact
High Volume NetFlow Collector : Enterprise Traffic Analysis

Pages:
Featured Events