- Netflow Solutions
One of our guiding principles is to stay in close contact with new technological and academic developments. We therefore fund research in network defense and situational awareness, enterprise risk identification and reduction, and Process Query System applications. Below we offer several links to both internal and external efforts in these areas as a starting point for interested readers.
It seems these days that the marketplace is saturated with flow export formats. CISCO has NetFlow, InMon has sFlow®, Juniper uses JFlow, and there are several others. Few of these manufacturers seem to release details on the inner workings of their protocols, and their subsequent benefits. What follows is an overview of flow technologies. NetFlow
Read the Whitepaper >>
If you want a 10,000ft overview of the concept of flow analysis, take a look at these 6 slides. It discusses the concept of a “flow”, the role of exporters and collectors, and the characteristics of various flow formats: Introduction to Flow Analysis.
Read the Whitepaper >>
Premium whitepaper discusses of best practices and the software applications available to manage, protect, and control operational IT assets. Download this paper to get 3 ready-to-use samples of implementation matrices including specific software recommendations for points such as: application administration, device monitoring, traffic monitoring, policy enforcement, malware repulsion, audit & compliance, backup & restore, hosts and appliances, and traffic forensics
Export CISCO NetFlow datagrams to up to 16 flow collectors. Flow Exporter captures 100% of the data in an easy-to-deploy way.
Download Now »
Advanced Threat Intelligence Services Added to FlowTraq Q2/13
Faster, more powerful, FlowTraq Q2/13 delivers detailed view of the potential network threats with NBI threat management and new threat intelligence service.
Have You Been Targeted by Chinese Espionage Units?
How to use Mandiant's Analysis and FlowTraq to Identify Threats: Mandiant's excellent analysis "APT1: Exposing One of China's Cyber Espionage Units" identifies a broad set of IP addresses...
Monitoring Your Security Measures: port knocking
Learn how to use knockd with FlowTraq to monitor security measures on SSH Server.