Michael Patterson : Advanced NetFlow Traffic Analysis
Michael Patterson
Founder and Product manager for Plixer's Scrutinizer NetFlow and sFlow Analyzer as well as Flow Analytics.

Forwarding UDP Packets

Many threat detection systems rely on reviewing logs in order to uncover contagions on the network.  In most cases, these logs come...

Full Story »

Tesla Model X vs. Porsche 911

I recently had a chance to test drive a friend's Tesla Model X and he could not have been more enthusiastic about...

Full Story »

Facebook and Google May Become Regulated Utilities

Google effectively has a monopoly in search and Facebook has one in social networking and together they have a virtual monopoly in...

Full Story »

TMC Partners with MWC and CTIA on Enterprise IoT Event

We are approaching the 20th IoT Evolution event and TMC and Crossfire Media keep working hard to improve the event, show after...

Full Story »

WebRTC for Business People - Update

Three or four years ago, when WebRTC was still a strange concept, Tsahi Levent-Levi wrote a paper called “WebRTC for Business People.”...

Full Story »

Unified Communications in the Cloud

A couple of weeks ago, I explored the migration to Unified Communications and gave my point of view about how the migration is somewhat...

Full Story »

DieselGate: We Were Right, Something Smells Awful

Remember back in 2015 when we said something doesn't smell right in the VW diesel scandal? it would be impossible for the...

Full Story »
Archives of all blog posts:
Forwarding UDP Packets
What is Network Traffic Analytics
WannaCrypt proactive measures with NTA
Implementing the NIST Framework for Improving Cyber security
Threat Investigations Suffering from Lack of Context
A Massive Wave of Cybercrime Coming
DNS Firewall
Security Analytics - Network as a Sensor
Cisco Cyber Threat Defense : 4 Tell-Tale Signs of Data Exfiltration
Phishing Attack Training
Cisco nvzFlow Reporting
Splunk NetFlow Support : Vendor Comparison
Software Defined Network: 8 BIG Benefits
IPFIX Flow Direction and Packet Counters
Monitoring DNS Traffic for Security Threats
Building an Incident Response Team: 4 Specialties
How To Investigate Malware
Riverbed NetFlow Analyzer
NetFlow Calculator for Supermen!
Software Defined Networks Demystified: 5 Truths
Cisco AVC Reporting: Flexible NetFlow Configuration
Configuring Citrix AppFlow Support
Palo Alto NetFlow Configuration
Been Hacked - What will you do?
Cisco AVC Webcast - Future Proof your Network
UserName with NetFlow or IPFIX
AKCP Reseller : AKCP Distributor
Securing Remote Networks Against Cyber Threats: part 2
Securing Remote Networks Against Cyber Threats: part 1
Router Overhead When Enabling NetFlow
Cisco Wireless Controller NetFlow Configuration
Building a NetFlow Cache: Exporting IPFIX
Amazon EC2 Monitoring: Network Performance
Enterasys Dragon: Intrusion Prevention System Log Analysis
Next Generation Firewalls with Application Performance Monitoring In Mind
Palo Alto Networks NetFlow Export includes Firewall Event Field in PAN-OS 5.0
IPFIX Vendors should implement RFC 5610
Log Management Solutons
Nimsoft Service Desk Pricing: Distributed NetFlow Solutions
NetFlow Training Seminar: NetFlow University
NetFlow Training Schedule for 2012
Flexible NetFlow Configuration example for Performance Monitoring for TCP, VoIP and Cisco NBAR
Ingress NetFlow or Egress NetFlow part 2
Ingress NetFlow or Egress NetFlow part 1
Cloud Service Monitoring
Temperature Monitoring Solutions with Remote Humidity Sensors
Cisco ASA Vs. Juniper SRX: NetFlow Reporting
How to roll out BYOD Security: Best Network Management
Detecting Advanced Persistent Threats with NetFlow and IPFIX
Monitoring BYOD traffic with NetFlow
Migrating to Flexible NetFlow : BEST PRACTICES
Monitoring Video Performance with NetFlow
End to End Visibility : Network Flow Path
Dropped NetFlow : Flow Sequence Numbers
Email Monitoring Software: Email Reporting
NetFlow Behavior Analysis Systems : Limited Impact
High Volume NetFlow Collector : Enterprise Traffic Analysis

Pages:
Featured Events