Michael Patterson : Advanced NetFlow Traffic Analysis
Michael Patterson
Founder and Product manager for Plixer's Scrutinizer NetFlow and sFlow Analyzer as well as Flow Analytics.

Homeland Security and EU Remind us Companies are Not Cybersecure

In case the news of constant breaches isn't enough to inform you that most companies are not prepared for cyberattacks, recently, the...

Full Story »

Fuze Touts Rapid Growth and Significant Samsung Partnership

Fuze is a global UCaaS provider – in business since 2006. Their average seat size is greater than 3,000 with 40% of...

Full Story »

Infovista Ipanema SD-WAN Now With Nextgen Application Intelligence+ and Cloud-Native Orchestration

In an in-person interview, Ricardo Belmar, Sr. Dr. Global Enterprise Marketing, Infovista explained the company’s Ipanema SD-WAN has enhanced application intelligence as...

Full Story »

CallMiner Makes AI-Fueled Speech Analytics a Reality

CallMiner allows organizations to extract intelligence from customer interactions,” said Scott Kendrick, VP of Marketing In an in-person interview. You may know...

Full Story »

Omilia Conversational AI Expands into Cloud

Omilia is a software company focusing on customer service automation. They have an AI system commercially deployed at large scale. They handle...

Full Story »

PCM Enhances Collaboration Portfolio

PCM is the 2.3 billion dollar a year organization you may not have heard of. They were once PC Mall – remember...

Full Story »

Beware of New Zealand-Related Scams and Malware Campaigns

Please make note of this important warning from DHS: ---In the wake of the recent New Zealand mosque shooting, the Cybersecurity and...

Full Story »

How to roll out BYOD Security: Best Network Management

April 24, 2012

You’ve been allowing it for months or even years and now you’ve decided to get serious about how to roll out a secure BYOD environment. Supporting BYOD is easy.   Making BYOD secure is the tricky part and then there is always network traffic monitoring to make sure your BYOD security strategy is working.  Today I’m going to outline several steps that Patrick Sweeney (VP of Product Marketing) at SonicWALL shared with me.   These steps should be considered when setting up a ‘reasonably’ safe BYOD environment.

Patrick Sweeney – VP, SonicWALL

Detecting Advanced Persistent Threats with NetFlow and IPFIX

April 11, 2012

Detecting Advanced Persistent Threats and other Network Security Threats with NetFlow and IPFIX requires advanced flow analytics. For example Top hosts, top applications, top DSCP values, etc., it’s great information and these reports can be used both reactively and proactively but, it’s just the tip of the iceberg as NetFlow can tell us about all kinds of anomalous traffic that may be flying under the radar. 

Monitoring BYOD traffic with NetFlow

March 24, 2012

Monitoring BYOD traffic is a growing concern amonst network administrators.  Why?  Gartner predicts that 645 million smartphones will be sold in 2012 – a 40% increase from this year.  Cell phone reception is often weak on the interior of office buildings and smartphone owners will have their WiFi on.  What's more is that many companies are allowing employees onto the corporate net with their personal smart phones in hopes of increased productivity.



Migrating to Flexible NetFlow : BEST PRACTICES

March 8, 2012

Migrating to Flexible NetFlow (FnF) is a simple and for some of us, an exciting process. It is exciting because of the deeper and improved insight into network traffic monitoring. If your company is interested in migrating to FnF  from traditional NetFlow, there are a few things to consider.

Monitoring Video Performance with NetFlow

February 19, 2012

Three years ago I was listening to John Chambers - CEO of Cisco Systems, proclaim that video was going to be the rage. I snickered and though it would be long time before anyone will be monitoring video performance with NetFlow. Well, here we are and John Chambers was right. My daughter is the one that made me realize why video vs. only voice will continue to grow.

End to End Visibility : Network Flow Path

February 6, 2012

Gaining end to end visibility into the path a flow took through the network can be an easy thing to do if you have the right network traffic monitoring tool.   Because multiple paths exist between devices, leveraging traceroute or routed topology information may not provide the exact path taken by an end to end flow.  To help address this mystery, a couple of utilities exist on the market today.

Dropped NetFlow : Flow Sequence Numbers

January 29, 2012

Dropped NetFlow detection should be a major part of the decision making process in your next enterprise NetFlow collector. High volume Netflow collection and reporting without regard to the NetFlow Sequence Numbers should send up red flags to an educated consumer in the market for a reliable NetFlow and IPFIX collector. Here’s why: It is a safe bet that companies serious about network traffic analysis or network traffic monitoring want to know if they are looking at all the data. In many cases they may not be. How would they know?



Email Monitoring Software: Email Reporting

January 20, 2012

Email monitoring and email reporting is an important proactive responsibility that is not addressed in some companies. Who are the top email senders and receivers. What are the top domains sending or receiving emails? What are the top email subjects and who is involved with these emails. These types of reports allow you to investigate email issues such as repeated bounce backs and even virus trails.



NetFlow Behavior Analysis Systems : Limited Impact

January 13, 2012

NetFlow Network Behavior Analysis (NBA) systems have limited impact on detecting threats. They are only suitable as a second or perhaps third layer of threat detection. Some companies offering NetFlow Threat Detection tools would have you believe otherwise. Don't fall for it. "Gartner says NBA is suitable as a complementary technology to intrusion detection and prevention software, which is effective for addressing network attacks that can be positively identified." As a HUGE NetFlow and IPFIX supporter, I tend to agree that flow technologies can augment security practices, but can't replace them.

High Volume NetFlow Collector : Enterprise Traffic Analysis

January 3, 2012

A high volume NetFlow collector is a must for many service providers and universities. Because of the nature of the type of Internet traffic created by these types of organizations, enormous amounts of flows are created. People visiting internet search sites such as Google or those of us clicking on all the different links in facebook or youtube often end up creating a new flow with each click.

Previous 1 2 3 4 5 6
Featured Events