Introduction Digital transformation and migration to the cloud is now inevitable for organizational success. Gone are the days of legacy… Read more »
Category: Security
Detecting the Log4j Exploit – December 2021
Using Network Visibility for Cyberthreat Hunting and Detection and Response Detecting the indicators of compromise from cyberattacks such as the… Read more »
Network vs Server vs Application – Don’t play ping pong isolating issues!
The game of ping pong is something I enjoyed in my youth, like many of us. Working in the IT… Read more »
Three Reasons Why Ransomware Recovery Requires Packet Data
Data from SonicWall’s 2021 Cyber Threat Report showed more ransomware attacks in the first half of 2021 than in all of 2020.… Read more »
Your Cloud Security Is Constantly Being Tested
Cyber Risk Resilience Requires Cloud Visibility Whether your IT infrastructure is all cloud, all physical, or a hybrid mixture, it… Read more »
The Why and How of a Two-Tier Network Monitoring Topology
Cyber Criminals Exploit 100Gbps Blind Spots As data centers upgrade to 100 Gbps speeds to support the need for speed… Read more »
Network Visibility Is Key To Reducing Cyber Risks
Facts It is an unfortunate fact that cyberattacks and other cyber risks are increasing. All aspects of cybercrime are increasing… Read more »
Why We Fuss About Network Detection and Response
cPacket Networks talks a lot about Network Detection and Response (NDR). We also talk a lot about Network Visibility, which… Read more »
What’s Needed for High-Fidelity, Low-Latency HPC Network Monitoring at 100Gbps
Enterprise migration to 100Gbps network speeds continues to accelerate, with high-performance computing (HPC) data centers leading the charge. According to data from… Read more »
Assuring Business Continuity by Reducing Malware Dwell Time
Here’s How CISOs and IT Security Operations Teams Can Best Address Key Challenges To Network Monitoring That Could Increase Malware… Read more »
Starting A Successful AIOps Initiative
The application of artificial intelligence (AI) and machine learning (ML) to IT infrastructure and operations (I&O) – known as AIOps… Read more »
Perspective and FAQ About the SolarWinds Orion Hack Discovered in December 2020
The Importance of Network Visibility and Observability to Defend Against Cyberattacks Our focus at cPacket Networks is to “eliminate blind… Read more »
Network Visibility – It Must Be Reliable, Comprehensive, and Unbiased Because Good Enough Is Not Good Enough
The Answer to Why You Need Highly Reliable Network Monitoring that is Independent from Your Network This blog addresses the… Read more »
Auto-Scaling Network Visibility in AWS Cloud
Amazon Web Services (AWS) launched the new Gateway Load Balancing (GWLB) services feature that has lots of significance for cPacket… Read more »
Reducing Customer Churn by Investing in Network Visibility
Great experiences drive customer loyalty, lifetime value, and a competitive advantage; conversely poor experiences drive churn. Assuring great customer and… Read more »
Cloud Monitoring is Critical to Realizing AI-Powered Benefits
Public cloud Infrastructure-as-a-Service (IaaS) offers many benefits, but it is important to note that it is still infrastructure. Just like… Read more »
Network Traffic Intelligence for Cyber Security Incident Response
Network Traffic Analysis (NTA) uses a combination of advanced analytics, machine learning, and rule-based detection to identify suspicious activities throughout… Read more »
The Dirty Little Secret of Network Packet Brokers
A Network Packet Broker has a lot in common with a high performance vehicle. Imagine you bought an off-road vehicle… Read more »
At Last, a 100Gbps Visibility Solution that Works
You wouldn’t expect a used 1950s family car to offer the same speed and functionality of a high-performance car, would… Read more »
Comparing TAPs Versus SPAN Ports
When we’re looking to monitor network traffic, we have two options to choose from: Taps or Span ports. Let’s take… Read more »
How cPacket Networks Improved the Security Infrastructure of a Global Fortune 500 Company
Today’s networks are faced with the challenge of ensuring that their existing security and monitoring tools can keep pace with… Read more »
Looking Ahead: the Future of Network Monitoring
The future of the network is far more complex than we could have imagined. The consumerization of IT, mobile devices,… Read more »
The Future of Network Security: 100Gbps and Beyond
Every day, network operators (NetOps) and security operators (SecOps) are faced with new network challenges. Networks have become more complex… Read more »
Lessons Learned from the Latest Data and Security Breaches
The risk to companies experiencing data and security breaches is higher now than ever before. In 2017 alone, some of… Read more »
Securing Your Network with the Right Packet Broker Solutions
Global enterprises struggle daily to prevent security breaches. Even the largest entities such as Facebook, Twitter, and Target have all… Read more »
A Network Operator’s Top 3 Needs
Data center security has always been critical to the success of today’s enterprises. Today’s IT landscape is becoming increasingly digitized… Read more »
Cisco Connect Event Recap
Cisco Connect took place yesterday in San Francisco and we were there to take part in all the action. The… Read more »
Google Your Entire Network for Complete Visibility
The demand for increased visibility, security, and better performance monitoring means that today’s organizations need a solution that can deliver… Read more »
Understanding the Use Cases for RESTFUL APIs
Roy Fielding defined REST (Representational State Transfer) in early 2000 and developed the REST architectural style which has changed how… Read more »
The Importance of Improving Network Security Visibility
Today’s digital landscape has changed the way we see and deal with network security. From data breaches to security attacks,… Read more »
Network Performance Monitoring and Security: Simply Better Together
When we talk about the need for a comprehensive security approach to network monitoring, what we’re really stressing is the… Read more »
Convergence of NetOps and SecOps Transforming Traditional IT Silos
A recent study from Enterprise Strategy Group (ESG) found that 92% of respondents agree that network security monitoring depends on… Read more »
Do You Know What “Dynamic Truncation” is? If Not, Read On.
It’s no surprise that today’s modern networks require intelligent tools to support their needs. Among these include: improved efficiency, faster… Read more »
Using cPacket’s cVu to Identify and Troubleshoot Unusual Packet Types
For those of you that have struggled with network tools that fail to decode packets coming from a SPAN port,… Read more »
WannaCry: Ransomware Attacks: How to be Vigilant?
Friday, May 12, 2017 was certainly a “Friday, the Thirteenth” for the owners of more than 230,000 computers from more… Read more »
With Network Security, It’s No Longer a Question of If, But When
While 2016 isn’t quite over, we’ve already hit a new record for the number of major data breaches reported. In… Read more »