Recent disruptions to two undersea internet cables in the Baltic Sea have yet again...

The latest BGP network optimization and IP flow analysis trends.
Over the recent weekend, the digital world faced a stark reminder of its vulnerabilities when Seacom, a crucial link...
Effective network monitoring plays a crucial role in modern network management. To achieve this, protocols like...
SUBSCRIBE TO OUR NEWSLETTER
On August 8th, 2014 some ISPs experienced a phenomenon called the “512k Day”. The global BGP routing table, which...
Bring Your Own Device (BYOD) is a practice that allows users to bring their personal devices such as tablets or...
The report offers specific insights into the performance of major Internet Carriers...
So far, we have discussed NetFlow configuration for network devices from various vendors such as Cisco, Juniper,...
Our previous article discusses flow-based SSH compromise detection. A force attack against SSH hosts consists of scan,...
Secure Shell (SSH) provides a secure channel over an unsecured network in a client-server model. SSH is typically used...
The report offers specific insights into the performance of major Internet Carriers...
The Internet we know nowadays cannot properly operate without using the Domain Name System (DNS). DNS syncs up domain...
Simple Network Management Protocol (SNMP) is a well-known standardized application layer protocol, originally...
Duplication of NetFlow occurs when the NetFlow records about the same flow are exported multiple times to a NetFlow...
In our previous article we have discussed the alternative way to get flow statistics using a NetFlow generator. One of...
What is a NetFlow Generator? A NetFlow generator is a dedicated network appliance or software running on a PC and...
The report offers specific insights into the performance of major Internet Carriers...
This is the second part of the post dedicated to NetFlow configuration. In the first part, we’ve discussed the...
One of our recent blog posts dedicated to NetFlow technology provides the necessary knowledge needed to understand...
The report offers specific insights into the performance of major Internet Carriers...
Flow-based (NetFlow, IPFIX, NetStream) and packet-based (sFlow) network monitoring technologies enable network...
Network monitoring is a systematic effort to monitor parameters of a computer network in order to detect issues that...
The report offers specific insights into the performance of major Internet Carriers...
Nowadays, the very abstract ideas underlying the quantum physics are being translated into reality thanks to new...