NetVizura Blog

Fortinet NetFlow and EventLog configuration

Fortinet is one of the most used Next Gen Firewalls in the world. It is hard not to be immediately attracted to full integration of end-to-end security across the whole network infrastructure. This is conducted via modules, that are easily enabl...
read more...
  8 Hits
8 Hits

Checkpoint NetFlow and EventLog configuration

CheckPoint is definitely one of the cybersecurity industry leaders, with product portfolio that spans from advance network threat prevention solutions to NGFW. On our favorites list is undoubtedly their new GAiA Operating System, which represents one...
read more...
  45 Hits
45 Hits

Palo Alto NetFlow and EventLog configuration

Palo Alto Networks is one of the most famous cybersecurity companies, mainly known for their next generation firewall devices. Their Operating System, PAN-OS is renowned for its ease of use and numerous configuration options. One can configure e...
read more...
  102 Hits
102 Hits

pfSense NetFlow and EventLog configuration

pfSense is a free network firewall distribution, based on FreeBSD OS and includes numerous third party free software packages intended to expand firewall functionality. pfSense hardware can be installed on common hardware or in the cloud. This variet...
read more...
  690 Hits
690 Hits

Mikrotik - NetFlow and EventLog Configuration

Mikrotik devices are feature-rich and wallet-lite and that makes them one of the most used devices in the Europe and the rest of the World. Numerous SOHO and SMB companies use them for great graphical interfaces (winbox) and their huge customization ...
read more...
  531 Hits
531 Hits

NetFlow Analyzer - End Users Traffic Analysis

When thinking about network traffic and security, we usually end up considering NetFlow Analyzers for analytics and monitoring. It allows us to plan our network and detect security issues fast and easy. But the raising concern is also our core need f...
read more...
  1119 Hits
1119 Hits

5 Reasons for Using NetFlow

Network traffic and network complexity have substantially increased by globalization, virtualization, widespread use of personal devices (BYOD), DDoS attacks and similar trends, bringing up new security issues. Traditional approaches to network monit...
read more...
  2370 Hits
2370 Hits

Multicast accounting configuration using Flexible NetFlow - Part Two

As the problem of multicast flow analysis was addressed in our previous blog , we have distinguished two scenarios – input and output flow accounting configuration. Therefore, during the following demonstration, we will investigate how NetFlow multic...
read more...
  2109 Hits
2109 Hits

Multicast accounting configuration using Flexible NetFlow - Part One

​ With the rapid proliferation of video services, particularly video streaming, deployment of multicast services demands an appropriate monitoring to be in place in order to keep track of this traffic type. Adequate and comprehensive monitoring is pa...
read more...
  2345 Hits
2345 Hits

5 ways to use NetFlow Analyzer for Network Security

The frequency of cyber attacks increased a variety of vectors (e.g. unprotected IoT device botnets, Attack as a Service software, SSL-based attacks, etc.) and their overall sophistication has made them a serious threat to networks around the World. G...
read more...
  3296 Hits
3296 Hits

Contact

Mailing and Visiting Address:
Soneco d.o.o.
Makenzijeva 24/VI, 11000 Belgrade, Serbia
Phone: +381.11.6356319
Fax: +381.11.2455210
sales@netvizura.com | support@netvizura.com

CONNECT WITH US:

linkedin facebook facebook