Michael Patterson : Advanced NetFlow Traffic Analysis
Michael Patterson
Founder and Product manager for Plixer's Scrutinizer NetFlow and sFlow Analyzer as well as Flow Analytics.

Longview IoT Boosts Energy and Wireless Efficiency

Some of the biggest challenges slowing down the adoption of IoT are security, efficient battery usage and optimized wireless communications.One company has...

Full Story »

Hallmark's Simple, Inexpensive Way to Boost Customer Satisfaction

In an effort to boost margins, companies often push more users to automated solutions such as FAQs, chatbots, voice bots and anything...

Full Story »

Huawei Places the World's First 5G VoNR Video Call

Huawei recently completed the world's first voice over NR (VoNR) call. The voice and video call service was made using two Huawei...

Full Story »

IGEL Advances Future of Work

IGEL is a provider of a next-gen edge OS for cloud workspaces. The company’s software products include IGEL OS, IGEL UD Pocket (UDP) and Universal...

Full Story »

Tata Communications and Cisco Collaborate on SD-WAN

Tata Communications and Cisco have extended their partnership to enable enterprises to transform their legacy network to a customized and secure multi-cloud...

Full Story »

How to Win the 50-Year-Old China Trade War

Today and this week in-fact is historic - the left and right in the U.S. agree that we have a major trade...

Full Story »

Extreme Elements Enables The Autonomous Enterprise

Extreme Networks just announced Extreme Elements which in-turn enables the autonomous network and subsequently the autonomous enterprise. In a dynamic webinar, Dan...

Full Story »

How to roll out BYOD Security: Best Network Management

April 24, 2012

You’ve been allowing it for months or even years and now you’ve decided to get serious about how to roll out a secure BYOD environment. Supporting BYOD is easy.   Making BYOD secure is the tricky part and then there is always network traffic monitoring to make sure your BYOD security strategy is working.  Today I’m going to outline several steps that Patrick Sweeney (VP of Product Marketing) at SonicWALL shared with me.   These steps should be considered when setting up a ‘reasonably’ safe BYOD environment.

Patrick Sweeney – VP, SonicWALL

Detecting Advanced Persistent Threats with NetFlow and IPFIX

April 11, 2012

Detecting Advanced Persistent Threats and other Network Security Threats with NetFlow and IPFIX requires advanced flow analytics. For example Top hosts, top applications, top DSCP values, etc., it’s great information and these reports can be used both reactively and proactively but, it’s just the tip of the iceberg as NetFlow can tell us about all kinds of anomalous traffic that may be flying under the radar. 

Monitoring BYOD traffic with NetFlow

March 24, 2012

Monitoring BYOD traffic is a growing concern amonst network administrators.  Why?  Gartner predicts that 645 million smartphones will be sold in 2012 – a 40% increase from this year.  Cell phone reception is often weak on the interior of office buildings and smartphone owners will have their WiFi on.  What's more is that many companies are allowing employees onto the corporate net with their personal smart phones in hopes of increased productivity.



Migrating to Flexible NetFlow : BEST PRACTICES

March 8, 2012

Migrating to Flexible NetFlow (FnF) is a simple and for some of us, an exciting process. It is exciting because of the deeper and improved insight into network traffic monitoring. If your company is interested in migrating to FnF  from traditional NetFlow, there are a few things to consider.

Monitoring Video Performance with NetFlow

February 19, 2012

Three years ago I was listening to John Chambers - CEO of Cisco Systems, proclaim that video was going to be the rage. I snickered and though it would be long time before anyone will be monitoring video performance with NetFlow. Well, here we are and John Chambers was right. My daughter is the one that made me realize why video vs. only voice will continue to grow.

End to End Visibility : Network Flow Path

February 6, 2012

Gaining end to end visibility into the path a flow took through the network can be an easy thing to do if you have the right network traffic monitoring tool.   Because multiple paths exist between devices, leveraging traceroute or routed topology information may not provide the exact path taken by an end to end flow.  To help address this mystery, a couple of utilities exist on the market today.

Dropped NetFlow : Flow Sequence Numbers

January 29, 2012

Dropped NetFlow detection should be a major part of the decision making process in your next enterprise NetFlow collector. High volume Netflow collection and reporting without regard to the NetFlow Sequence Numbers should send up red flags to an educated consumer in the market for a reliable NetFlow and IPFIX collector. Here’s why: It is a safe bet that companies serious about network traffic analysis or network traffic monitoring want to know if they are looking at all the data. In many cases they may not be. How would they know?



Email Monitoring Software: Email Reporting

January 20, 2012

Email monitoring and email reporting is an important proactive responsibility that is not addressed in some companies. Who are the top email senders and receivers. What are the top domains sending or receiving emails? What are the top email subjects and who is involved with these emails. These types of reports allow you to investigate email issues such as repeated bounce backs and even virus trails.



NetFlow Behavior Analysis Systems : Limited Impact

January 13, 2012

NetFlow Network Behavior Analysis (NBA) systems have limited impact on detecting threats. They are only suitable as a second or perhaps third layer of threat detection. Some companies offering NetFlow Threat Detection tools would have you believe otherwise. Don't fall for it. "Gartner says NBA is suitable as a complementary technology to intrusion detection and prevention software, which is effective for addressing network attacks that can be positively identified." As a HUGE NetFlow and IPFIX supporter, I tend to agree that flow technologies can augment security practices, but can't replace them.

High Volume NetFlow Collector : Enterprise Traffic Analysis

January 3, 2012

A high volume NetFlow collector is a must for many service providers and universities. Because of the nature of the type of Internet traffic created by these types of organizations, enormous amounts of flows are created. People visiting internet search sites such as Google or those of us clicking on all the different links in facebook or youtube often end up creating a new flow with each click.

Previous 1 2 3 4 5 6
Featured Events