All General
critical infrastructure

Protecting Critical Infrastructure from Cyberattacks with Network Traffic Analytics

According to a recent New York Times’ article, there have been cyberattacks on critical infrastructure Saudia Arabia recently. While these attacks were not elaborated...

Correlating NetFlow with RADIUS Usernames

Correlating NetFlow with RADIUS Usernames to improve context security awareness is something we have done for several vendors including Cisco ISE, Microsoft Network Policy...

The Danger of Google’s Massive Harvesting

It’s pretty safe to say that most users are well aware that companies like Google, Facebook, LinkedIn and hundreds of others are harvesting data...

UDP Packet Forwarding

If your company has a couple of SIEMS or maybe more than one NetFlow collector, you could probably benefit from a UDP Packet Forwarding...

User Authentication Monitoring

Despite continued improvements in malware prevention, the success rate of infections still out paces the industries best detection methods. This is true even though...

DNS Unlocker Malware

Our malware detection team plays particularly close attention to DNS traffic because a lot of serious exfiltration occurs as the result of DNS abuse. ...

NetFlow Vs. Packet Capture

Until the introduction of flow technologies like NetFlow and the standard called IPFIX, companies relied largely on two technologies. The first was SNMP which...

Google Map Integration | GPS Coordinates

We were an early adopter of supporting Google map integration in our NetFlow collector system. Since then, we have had customers asked that we pull in...

Cisco IWAN Training

One of the biggest questions being asked of IT professionals is, “Are we using our bandwidth to its fullest potential”? Of course we have...

Cisco ASA FireSIGHT Integration

UPDATE 8/9/17: We have written a more recent blog on this topic, which can be found here. Back in February at CiscoLIVE! in Berlin Germany...