netflow

July 12, 2016

SECURITY

Cisco Stealthwatch Learning Network License for your digital-ready network

Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield…

July 6, 2016

SECURITY

NetFlow AND PCAP (not or)

As digital transformation sweeps across the world, there is a driving need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on…

June 9, 2016

SECURITY

Detection in Depth

Defense in depth is a well understood and widely implemented approach that can better secure your organization’s network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and redundant defenses. If one layer fails, there will still be other defe…

May 9, 2016

SECURITY

The Formula One Approach to Security

Many of today’s systems are built on telemetry, the automated gathering of remote data measurements to gain insights and manage performance and operations. One industry that has been quick to embrace telemetry is auto racing. Winning racing teams are outfitting their cars with around 100 sensors tha…

March 2, 2016

SECURITY

Digitization Compels a Fresh Approach to Network Security

We know that organizations today must digitize to thrive, with the CIO and IT teams at the helm of the transformational journey.   Why does this matter?  Because businesses must find ways to deliver more modern business operations as well as satisfying customer and workplace experiences or quickly f…

November 16, 2015

SECURITY

An introduction to the new Cisco Network Visibility Flow Protocol (nvzFlow)

As recently announced, Cisco AnyConnect 4.2 extends visibility to the endpoint with the Network Visibility Module (NVM).  Users are one of the most vulnerable parts of any security strategy, with 78% of organizations saying in a recent survey that a malicious or negligent employee had been the cause…

December 2, 2014

SECURITY

Step-by-Step Setup of ELK for NetFlow Analytics

Contents   Intro Java Elasticsearch Logstash Kibana   Intro   The ELK stack is a set of analytics tools. Its initials represent Elasticsearch, Logstash and Kibana. Elasticsearch is a flexible and powerful open source, distributed, real-time search and analytics engine. Logstash is a…

July 8, 2014

TECHWISETV

Wireless Stew, Intoxicating Demo and Plixer

One of the best times I always have at Cisco Live involves getting to play ‘TV Anchor’ for the various live shows we stream. Well the Cisco TV team lets us use their equipment to do a live version of TechWiseTV each afternoon as well. Now honestly, I do plan these out…a little. But…

April 1, 2014

NETWORKING

RetailMeNot Leverages Cisco and Plixer for WLAN Optimization

Founded in 2007, RetailMeNot.com is the largest digital coupon site in the US.  They help hundreds of thousands of customers save money when shopping online. They are headquartered in Austin Texas, in the hip “Live Music Capital of the World”.  Since the company went public in 2013, the company has…