Check out all of our upcoming events

Blog

Get news about our products, which events we are attending plus industry insights and commentary

Articles tagged with: IPFIX

Threat Hunting and Network Monitoring with NetFlow at Scale

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 14 June 2019. Posted in Cyber

As 5G is rolled out globally, mobile carriers will benefit from significant revenue opportunities driven by growth in the mobile market, from better customer service to new 5G-enabled business models. However, the industry also recognises that 5G will dramatically raise the stakes for those who are tasked with ensuring the security and reliability of these networks.

Network Visibility in the 100/25GbE High Density Data Centre Era

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 30 May 2019. Posted in Cyber

As the demand for bandwidth continues to grow, the migration from 100G to 400G will be the next developmental step in data centre architecture. Research from Crehan Research Inc. shows that shipments of 10GbE and 40GbE data centre switches each declined in 2018, while 25GbE and 100GbE continued to grow significantly, signalling that we are now solidly in the 100/25GbE era.

Breaking Down DDoS UDP Flood Attacks

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Wednesday, 03 October 2018. Posted in Cyber

A UDP flood is a type of volume based DDoS (Distributed Denial of Service) attack, where large numbers of UDP (User Datagram Protocol) packets are sent to a target server, limiting its ability to carry out its functions. UDP traffic doesn’t require a three-way handshake to make a connection like TCP (Transmission Control Protocol), it runs with lower overhead and is ideal to carry data that doesn’t need to be checked and rechecked, such as VoIP. This means it is easier for attackers to generate large traffic volumes with tools like Low Orbit Ion Cannon (LOIC) and UDP Unicorn.

Is it important to differentiate between flows and conversations?

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 09 November 2017. Posted in Cyber

There are many moving parts to a successful network security strategy, everything that makes a network a network such as e-mails, web requests and file transfers is a potential ‘route in’ for a security or compliancy issue. It’s important for those managing enterprise IT Systems to know everything about them, every bit of information is pertinent to ensuring a smoothly run operation.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.