Network traffic analysis News
January 04, 2018
Cisco has integrated Encrypted Traffic Analytics into Catalyst switches and ASR and ISR routers. Cisco ETA searches encrypted traffic for malware activity.
December 08, 2017
A critical vulnerability found in the Windows Malware Protection Engine required an emergency Microsoft patch, but one expert said Microsoft hasn't handled the announcement well.
May 03, 2016
The latest Viptela vEdge brings SD-WAN to sites that need a router with a maximum throughput of 100 Mbps.
March 11, 2016
News roundup: DROWN attack affects millions of servers with an SSLv2 vulnerability; the Home Depot breach lawsuit settlement is pending; and Chinese smartphone-maker ZTE is sanctioned.
Network traffic analysis Get Started
Bring yourself up to speed with our introductory content
Achieving cybersecurity readiness requires a solid information security architecture. Expert Peter Sullivan explains the core building blocks that enterprises need to build one. Continue Reading
Billions of IoT devices means there's a lot of data to process. Start crafting edge computing strategies now to lessen the impact on your network, advises an expert. Continue Reading
The success of the IoT transformation is dependent on IT pros' ability to manage M2M traffic and assure the uptime and functionality of networks. Continue Reading
Evaluate Network traffic analysis Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn the criteria for choosing the best network monitoring tool for your enterprise. Continue Reading
Continuous network monitoring and traffic analysis are crucial ingredients for cybersecurity readiness. Expert Peter Sullivan explains what enterprise security teams need to know. Continue Reading
Hospitals will continue to be a prime target for cyberattacks in 2017, but IT can prevent an attack by training end users on email best practices and monitoring network traffic. Continue Reading
Manage Network traffic analysis
Learn to apply best practices and optimize your operations.
While a VPN is useful for multicloud networks, IT teams still need to be careful to avoid high traffic charges, as applications move from one provider to another. Continue Reading
In this software age, is there any role left for hardware? In our three-part guide, our experts' response is a resounding, "yes." It may feel like this is the era of software-defined everything and that there's no place left for hardware, but that's an illusion. It only seems like network hardware is out because software is oh-so in. The time has come to correct that assumption. Just because most things appear to be getting software-defined, that doesn't mean hardware should be placed on the metaphorical back burner.
In the big hardware vs. software debate, hardware definitely has its place, and some of its roles are expanding rather than shrinking. Even in this virtualization revolution, there's an ongoing hardware evolution. This technical guide looks at why and where hardware is still an essential networking choice in terms of scale, reliability and performance.Continue Reading
Internet of Things devices are propagating within the enterprise. Expert Michael Cobb explains how an IoT device discovery process can help thwart security risks. Continue Reading
Problem Solve Network traffic analysis Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malware is increasingly using DNS tunnels to aid in data exfiltration. Expert Nick Lewis explains how the attacks work and how best to defend against them. Continue Reading
Brocade makes generally available an OpenDaylight SDN app that improves network performance through more efficient traffic flow. Continue Reading
Expert Michael Gregg discusses how dynamic Address Resolution Protocol inspection helps prevent hackers from penetrating enterprise switches. Continue Reading