<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Rafi Sabel, Author at CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</title>
	<atom:link href="https://cysight.ai/author/rafi/feed/" rel="self" type="application/rss+xml" />
	<link>https://cysight.ai/author/rafi/</link>
	<description>AI-Driven Cybersecurity for NetFlow, IPFIX and sFlow, with Encrypted Traffic Analysis, Baselining and Security Observability</description>
	<lastBuildDate>Thu, 18 Dec 2025 07:03:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Hunt SUNBURST and Trojans with Turbocharged Netflow.</title>
		<link>https://cysight.ai/cysight_solves_sunburst/</link>
					<comments>https://cysight.ai/cysight_solves_sunburst/#respond</comments>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Mon, 10 Mar 2025 12:06:31 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/?p=13390</guid>

					<description><![CDATA[<p>US: December 13 of 2020 was an eye-opener worldwide as Solarwinds software Orion, was hacked using a trojanized update known as SUNBURST backdoor vulnerability. The damage reached thousands of customers, many of which are world leaders in their markets like Intel, Microsoft, Lockheed, Visa, and several USA  governmental agencies. The extent of the damage has...</p>
<p>The post <a href="https://cysight.ai/cysight_solves_sunburst/">Hunt SUNBURST and Trojans with Turbocharged Netflow.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="13390" class="elementor elementor-13390" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-0cde79c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="0cde79c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c3c47e" data-id="1c3c47e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f1ac5c3 elementor-widget elementor-widget-text-editor" data-id="f1ac5c3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>US: December 13 of 2020 was an eye-opener worldwide as Solarwinds software Orion, was hacked using a trojanized update known as SUNBURST backdoor vulnerability. The damage reached <span style="color: #3366ff;"><a style="color: #3366ff;" href="https://www.businessinsider.com/list-of-companies-agencies-at-risk-after-solarwinds-hack-2020-12?op=1" target="_blank" rel="noopener">thousands of customers</a></span>, many of which are world leaders in their markets like Intel, Microsoft, Lockheed, Visa, and several USA  governmental agencies. The extent of the damage has not been fully quantified as still more is being learned, nevertheless, the fallout includes real-world harm.</p><p>The recent news of the SolarWinds Orion hack is very unfortunate. The hack has left governments and customers who used the SolarWinds Orion tools especially vulnerable and the fallout will still take many months to be recognized. This is a prime example of an issue where a flow metadata tool has the inability to retain sufficient records, causing ineffective intelligence, and that the inability to reveal hidden issues and threats is now clearly impacting organizations&#8217; and government networks and connected assets.</p><p>Given what we already know and that more is still being learned, <a href="https://cysight.ai/go/free-trial" rel="noopener">it makes good sense to investigate an alternative solution</a>.</p><div id="s3gt_translate_tooltip_mini" class="s3gt_translate_tooltip_mini_box" style="background: initial !important; border: initial !important; border-radius: initial !important; border-spacing: initial !important; border-collapse: initial !important; direction: ltr !important; flex-direction: initial !important; font-weight: initial !important; height: initial !important; letter-spacing: initial !important; min-width: initial !important; max-width: initial !important; min-height: initial !important; max-height: initial !important; margin: auto !important; outline: initial !important; padding: initial !important; position: absolute; table-layout: initial !important; text-align: initial !important; text-shadow: initial !important; width: initial !important; word-break: initial !important; word-spacing: initial !important; overflow-wrap: initial !important; box-sizing: initial !important; display: initial !important; color: inherit !important; font-size: 13px !important; font-family: X-LocaleSpecific, sans-serif, Tahoma, Helvetica !important; line-height: 13px !important; vertical-align: top !important; white-space: inherit !important; left: 236px; top: 170px; opacity: 0.65;"><div id="s3gt_translate_tooltip_mini_logo" class="s3gt_translate_tooltip_mini" title="Translate selected text"> </div><div id="s3gt_translate_tooltip_mini_sound" class="s3gt_translate_tooltip_mini" title="Play"> </div><div id="s3gt_translate_tooltip_mini_copy" class="s3gt_translate_tooltip_mini" title="Copy text to Clipboard"> </div></div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e1c88e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e1c88e5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1491ccb" data-id="1491ccb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-e16cc43 elementor-widget elementor-widget-heading" data-id="e16cc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">What Is the SUNBURST Trojan Attack?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-8f575b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="8f575b5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5b72778" data-id="5b72778" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8351ec4 elementor-widget elementor-widget-text-editor" data-id="8351ec4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>SUNBURST, as named by <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" target="_blank" rel="noopener">FireEye</a>, is a kind of malware that acts as a trojan horse designed to look like a safe and trustworthy update for Solarwinds customers. To accomplish such infiltration to seemingly well-protected organizations, the hackers had to first infiltrate the Solarwinds infrastructure. Once Solarwinds was successfully hacked, the bad actors could now rely on the trust between Solarwinds and the targeted organizations to carry out the attack. The malware, which looked like a routine update, was in fact creating a back door, compromising the Solarwinds Orion software and any customer who updates their system.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-61690bf elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="61690bf" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b6d835e" data-id="b6d835e" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-55f83ba elementor-widget elementor-widget-heading" data-id="55f83ba" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How was SUNBURST detected?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b266d84 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b266d84" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-343951f" data-id="343951f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-9fe7741 elementor-widget elementor-widget-text-editor" data-id="9fe7741" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Initially, SUNBURST malware was completely undetected for some time. The attackers started to install a remote access tool malware into the Solarwinds Orion software all the way back in March of 2020, essentially trojaning them. On December 8, 2020, FireEye discovered their own red team tools have been stolen and started to investigate while reporting the event to the NSA. The NSA, also a Solarwinds software user, who is responsible for the USA cybersecurity defense, was unaware of the hack at the time. A few days later, as soon as the information became more public, different cybersecurity firms began to work on reverse engineering and analyzing the hack.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-7034389 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7034389" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e68c4eb" data-id="e68c4eb" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a844395 elementor-widget elementor-widget-heading" data-id="a844395" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">IT’S WHAT WE DON’T SEE THAT POSES THE BIGGEST THREATS AND INVISIBLE DANGERS!</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9d0b658 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9d0b658" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4904e5c" data-id="4904e5c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-6e8136c elementor-widget elementor-widget-text-editor" data-id="6e8136c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>You may be surprised to learn that most well-known tools lack the REAL Visibility that could have prevented attacks on a network and its local and cloud-connected assets. There are some serious shortcomings in the base designs of other flow solutions that result in their <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">inability to scale in retention.</a> This is why smart analysts are realizing that Threat Intelligence and Flow Analytics today is all about having access to long term granular intelligence.</p><p>From a forensics perspective, you would appreciate that you can only analyze the data you retain, and with large and growing network and cloud data flows most tools (regardless of their marketing claims) actually cannot scale in retention and choose to drop records in lieu of what they believe is salient data.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-f8dac10 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="f8dac10" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eeb11a8" data-id="eeb11a8" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b4a34bf elementor-widget elementor-widget-image" data-id="b4a34bf" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img fetchpriority="high" decoding="async" width="1024" height="525" src="https://cysight.ai/wp-content/uploads/CySight_retention--1024x525.png" class="attachment-large size-large wp-image-17237" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_retention--1024x525.png 1024w, https://cysight.ai/wp-content/uploads/CySight_retention--300x154.png 300w, https://cysight.ai/wp-content/uploads/CySight_retention--768x393.png 768w, https://cysight.ai/wp-content/uploads/CySight_retention--1536x787.png 1536w, https://cysight.ai/wp-content/uploads/CySight_retention--512x262.png 512w, https://cysight.ai/wp-content/uploads/CySight_retention--24x12.png 24w, https://cysight.ai/wp-content/uploads/CySight_retention--36x18.png 36w, https://cysight.ai/wp-content/uploads/CySight_retention--48x25.png 48w, https://cysight.ai/wp-content/uploads/CySight_retention-.png 1636w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5f77f73 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5f77f73" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5ef762f" data-id="5ef762f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1de185d elementor-widget elementor-widget-text-editor" data-id="1de185d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									Imputed outcome data leads to misleading results and missing data causes high risk and loss!​								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-6fc1704 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="6fc1704" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66f54ad" data-id="66f54ad" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-192764a elementor-widget elementor-widget-text-editor" data-id="192764a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>A simple way to think about this is if you could imagine trying to collect water from a blasting fire hose into a drinking cup. You just simply cannot collect very much!</p><p>Many engineers build scripts to try to attain the missing visibility and do a lot of heavy lifting and then finally come to the realization that no matter how much lifting you do that if the data ain’t there you can’t analyze it.</p>								</div>
				</div>
				<div class="elementor-element elementor-element-be7e094 elementor-widget elementor-widget-text-editor" data-id="be7e094" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									We found that over 95% of network and cyber visibility tools retain as little as 2% to 5% of all information collected resulting in completely missed analytics, severely misleading analytics, and risk! 								</div>
				</div>
				<div class="elementor-element elementor-element-40cf794 elementor-widget elementor-widget-image" data-id="40cf794" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="1024" height="606" src="https://cysight.ai/wp-content/uploads/CySight_Compare-1-1024x606.png" class="attachment-large size-large wp-image-17256" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_Compare-1-1024x606.png 1024w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-300x178.png 300w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-768x455.png 768w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-1536x910.png 1536w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-2048x1213.png 2048w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-512x303.png 512w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-24x14.png 24w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-36x21.png 36w, https://cysight.ai/wp-content/uploads/CySight_Compare-1-48x28.png 48w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-5fa2b2a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="5fa2b2a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-00dd51a" data-id="00dd51a" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5f152f7 elementor-widget elementor-widget-heading" data-id="5f152f7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">How does CySight hunt SUNBURST and other Malware?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-1f63079 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1f63079" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b097e0" data-id="4b097e0" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-824febc elementor-widget elementor-widget-text-editor" data-id="824febc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>It’s often necessary to try and look back with new knowledge that we become aware of to analyze.</p><p>For a recently discovered Ransomware or Trojan, such as SUNBURST, it is helpful to see if it’s been active in the past and when it started. Another example is being able to analyze all the related traffic and qualify how long a specific user or process has been exfiltrating an organization&#8217;s Intellectual Property and quantify the risk.</p><p>SUNBURST enabled the criminals to install a Remote Access Trojan (RAT). RATs, like most Malware, are introduced as part of legitimate-looking files. Once enabled they allow the hacker to view a screen or a terminal session enabling them to look for sensitive data like customer&#8217;s credit cards, intellectual property or sensitive company or government secrets.</p><p>Even though many antivirus products can identify many RAT signatures, the software and protocols used to view remotely and to exfiltrate files continues to evade many malware detection systems. We must therefore turn to traffic analytics and machine learning to identify traffic behaviors and data movements that are out of the ordinary.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-92fa955 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="92fa955" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45a7534" data-id="45a7534" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7bfdd2d elementor-widget elementor-widget-heading" data-id="7bfdd2d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Anonymity by Obscurity</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-50e4725 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="50e4725" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7bcd5ed" data-id="7bcd5ed" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-044773c elementor-widget elementor-widget-image" data-id="044773c" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img decoding="async" width="897" height="425" src="https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity.png" class="attachment-large size-large wp-image-13441" alt="Anonymity_by_obscurity" srcset="https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity.png 897w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-300x142.png 300w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-768x364.png 768w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-512x243.png 512w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-24x11.png 24w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-36x17.png 36w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-48x23.png 48w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-350x166.png 350w, https://cysight.ai/wp-content/uploads/Anonymity_by_obscurity-600x284.png 600w" sizes="(max-width: 897px) 100vw, 897px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-27d9b62 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="27d9b62" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-31ead2d" data-id="31ead2d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-0deb9bb elementor-widget elementor-widget-text-editor" data-id="0deb9bb" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>In order to evade detection, hackers try to hide in plain sight and use protocols that are not usually blocked like DNS, HTTP, and Port 443 to exfiltrate your data.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-097a83c elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="097a83c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ea24e59" data-id="ea24e59" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c3931cb elementor-widget elementor-widget-image" data-id="c3931cb" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="912" height="428" src="https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when.png" class="attachment-large size-large wp-image-13440" alt="Sharding_who_what_where_when" srcset="https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when.png 912w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-300x141.png 300w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-768x360.png 768w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-512x240.png 512w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-24x11.png 24w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-36x17.png 36w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-48x23.png 48w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-350x164.png 350w, https://cysight.ai/wp-content/uploads/Sharding_who_what_where_when-600x282.png 600w" sizes="(max-width: 912px) 100vw, 912px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-1dd55ad elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="1dd55ad" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f8c427" data-id="6f8c427" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-c55d15b elementor-widget elementor-widget-text-editor" data-id="c55d15b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Many methods are used to <a href="https://www.netflowauditor.com/index.php/2016/05/05/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1/">exfiltrate your data</a>. An often-used method is to use p2p technologies to break files into small pieces and slowly send the data unnoticed by other monitoring systems. Due to CySight&#8217;s small footprint Dropless Collection you can easily identify sharding and our anomaly detection will identify the outlier traffic and quickly bring it to your attention. When used in conjunction with a packet broker partner such as Keysight, Gigamon, nProbe or other supported packet metadata exporter, CySight provides the extreme application intelligence to help you with complete visibility to control the breach.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-15e030d elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="15e030d" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-30c0ab5" data-id="30c0ab5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-89a27a2 elementor-widget elementor-widget-heading" data-id="89a27a2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Identifying exposure</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-e3bc790 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="e3bc790" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af6b485" data-id="af6b485" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-458bb00 elementor-widget elementor-widget-image" data-id="458bb00" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="868" height="382" src="https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home.png" class="attachment-large size-large wp-image-13439" alt="Onion_routing_Malware_phone_home" srcset="https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home.png 868w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-300x132.png 300w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-768x338.png 768w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-512x225.png 512w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-24x11.png 24w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-36x16.png 36w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-48x21.png 48w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-350x154.png 350w, https://cysight.ai/wp-content/uploads/Onion_routing_Malware_phone_home-600x264.png 600w" sizes="(max-width: 868px) 100vw, 868px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-b74977a elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b74977a" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0a2dd7f" data-id="0a2dd7f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-a177e77 elementor-widget elementor-widget-text-editor" data-id="a177e77" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>In todays connected world every incident has a communications component</b></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-a6a8358 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a6a8358" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db9ba2c" data-id="db9ba2c" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-f9fb427 elementor-widget elementor-widget-text-editor" data-id="f9fb427" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>You need to keep in mind that all Malware needs to &#8220;call home&#8221; and today this is going to be through <a href="https://www.netflowauditor.com/index.php/2016/05/17/identifying-tor-threats-without-de-anonymizing/">onion routed connections</a>, encrypted VPNs, or via zombies that have been seeded as botnets making it difficult if not impossible to identify the hacking teams involved which may be personally, commercially or politically motivated bad actors.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-d9edd82 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="d9edd82" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c094188" data-id="c094188" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d17ce74 elementor-widget elementor-widget-heading" data-id="d17ce74" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h3 class="elementor-heading-title elementor-size-default">Multi-focal threat hunting</h3>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-439bda3 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="439bda3" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc40a7d" data-id="cc40a7d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-8ef7ca0 elementor-widget elementor-widget-image" data-id="8ef7ca0" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="1024" height="463" src="https://cysight.ai/wp-content/uploads/CySight_threat1-1024x463.png" class="attachment-large size-large wp-image-17240" alt="" srcset="https://cysight.ai/wp-content/uploads/CySight_threat1-1024x463.png 1024w, https://cysight.ai/wp-content/uploads/CySight_threat1-300x136.png 300w, https://cysight.ai/wp-content/uploads/CySight_threat1-768x347.png 768w, https://cysight.ai/wp-content/uploads/CySight_threat1-1536x694.png 1536w, https://cysight.ai/wp-content/uploads/CySight_threat1-2048x925.png 2048w, https://cysight.ai/wp-content/uploads/CySight_threat1-512x231.png 512w, https://cysight.ai/wp-content/uploads/CySight_threat1-24x11.png 24w, https://cysight.ai/wp-content/uploads/CySight_threat1-36x16.png 36w, https://cysight.ai/wp-content/uploads/CySight_threat1-48x22.png 48w" sizes="(max-width: 1024px) 100vw, 1024px" />															</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-95da8a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="95da8a1" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-265f7b7" data-id="265f7b7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-923852f elementor-widget elementor-widget-text-editor" data-id="923852f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Threat hunting for SUNBURST or other Malware requires <a href="https://www.netflowauditor.com/index.php/2015/12/22/balancing-granularity-against-network-security-forensics/">multi-focal analysis at a granular level</a> that simply cannot be attained by sampling methods. It does little good to be alerted to a possible threat without having the detail to understand context and impact. The Hacker who has control of your system will likely install multiple back-doors on various interrelated systems so they can return when you are off guard.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-fd95723 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="fd95723" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61f804f" data-id="61f804f" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7df8bec elementor-widget elementor-widget-heading" data-id="7df8bec" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">CySight Turbocharges Flow and Cloud analytics for SecOps and NetOps</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-a3da042 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a3da042" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ab883d" data-id="4ab883d" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-b08c809 elementor-widget elementor-widget-text-editor" data-id="b08c809" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>As with all CySight analytics and detection, you don&#8217;t have to do any heavy lifting. We do it all for you!</p><p>There is no need to create or maintain special groups with Sunburst or other Malware IP addresses or domains. Every CySight instance is built to keep itself aware of new threats that are automatically downloaded in a secure pipe from our Threat Intelligence qualification engine that collects, collates and categorizes threats from around the globe or from partner threat feeds.</p><p>CySight Identifies your systems conversing with Bad Actors and allows you to back track through historical data to see how long it&#8217;s been going on.</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-ffbf54b elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="ffbf54b" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-026be28" data-id="026be28" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<section class="elementor-section elementor-inner-section elementor-element elementor-element-a8b0579 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="a8b0579" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6c42159" data-id="6c42159" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7b90ae9 elementor-widget elementor-widget-image" data-id="7b90ae9" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
				<div class="elementor-widget-container">
															<img loading="lazy" decoding="async" width="341" height="132" src="https://cysight.ai/wp-content/uploads/Distributed_threat_collection.png" class="attachment-large size-large wp-image-13437" alt="Distributed_threat_collection" srcset="https://cysight.ai/wp-content/uploads/Distributed_threat_collection.png 341w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-300x116.png 300w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-24x9.png 24w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-36x14.png 36w, https://cysight.ai/wp-content/uploads/Distributed_threat_collection-48x19.png 48w" sizes="(max-width: 341px) 100vw, 341px" />															</div>
				</div>
				<div class="elementor-element elementor-element-2b3b10c elementor-widget elementor-widget-text-editor" data-id="2b3b10c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><b>Using Big Data threat feeds collated from multiple sources, thousands of IPs of bad reputation are correlated in real-time with your traffic against threat data that is freshly derived from many enterprises and sources to provide effective visibility of threats and attackers.</b></p>								</div>
				</div>
					</div>
		</div>
				<div class="elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-899ebe5" data-id="899ebe5" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-df1952a elementor-widget elementor-widget-text-editor" data-id="df1952a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<ul><li><h3>Cyber feedback</h3></li><li><h3>Global honeypots</h3></li><li><h3>Threat feeds</h3></li><li><h3>Crowd sources</h3></li><li><h3>Active crawlers</h3></li><li><h3>External 3rd Party</h3></li></ul>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-694d9a0 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="694d9a0" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34ca076" data-id="34ca076" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d3b85e2 elementor-widget elementor-widget-heading" data-id="d3b85e2" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
				<div class="elementor-widget-container">
					<h2 class="elementor-heading-title elementor-size-default">So how exactly do you go about turbocharging your Flow and Cloud metadata?</h2>				</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-57af704 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="57af704" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9c23c55" data-id="9c23c55" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-64281ff elementor-widget elementor-widget-text-editor" data-id="64281ff" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>CySight software is capable of the highest level of granularity, scalability, and flexibility available in the network and cloud flow metadata market. Lack of granular visibility is one of, if not the main flaw in such products today as they retain as little as 2% to 5% of all information collected, due to inefficient design, severely impacting visibility and risk as a result of missing and misleading analytics, costing organizations greatly.</p><p>CySight’s Intelligent Visibility, Dropless Collection, automation, and machine intelligence reduce the heavy lifting in alerting, auditing, and discovering your network making performance analytics, anomaly detection, threat intelligence, forensics, compliance, zero trust and IP accounting and mitigation a breeze!</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/cysight_solves_sunburst/">Hunt SUNBURST and Trojans with Turbocharged Netflow.</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cysight.ai/cysight_solves_sunburst/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>End Point Threat Detection Using NetFlow Analytics</title>
		<link>https://cysight.ai/end-point-threat-detection-using-netflow-analytics/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Fri, 21 Feb 2025 08:47:11 +0000</pubDate>
				<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=124</guid>

					<description><![CDATA[<p>Hi, good afternoon everyone. I’m from CySight. Our webinar today is on some of the finer security aspects of our product, specifically Anomaly Detection and End Point Threat Detection. End Point Threat Detection being one of the newer pieces that we&#8217;ve added to the system. It should take about half an hour today, and then...</p>
<p>The post <a href="https://cysight.ai/end-point-threat-detection-using-netflow-analytics/">End Point Threat Detection Using NetFlow Analytics</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="row-fluid-wrapper row-depth-1 row-number-3 ">
<div class="row-fluid ">
<div class="span8 widget-span widget-type-cell blog-content" data-widget-type="cell" data-x="0" data-w="8">
<div class="row-fluid-wrapper row-depth-2 row-number-1 ">
<div class="row-fluid ">
<div class="span12 widget-span widget-type-blog_content " data-widget-type="blog_content" data-x="0" data-w="12">
<div class="blog-section">
<div class="blog-post-wrapper cell-wrapper">
<div class="hs-blog-social-share">Hi, good afternoon everyone. I’m from <strong>CySight</strong>. Our webinar today is on some of the finer security aspects of our product, specifically <strong>Anomaly Detection</strong> and <strong>End Point Threat Detection</strong>. End Point Threat Detection being one of the newer pieces that we&#8217;ve added to the system. It should take about half an hour today, and then we&#8217;ll let you get back to your day. A reminder that everyone is on ‘mute’ during the presentation. We have a number of attendees here today, and we want to keep down the background noise, so everybody will automatically be muted. However, we encourage questions so, if you do have any, then please use the control panel, there&#8217;s a little question tab you can type in your question, and I will see them and respond to them probably towards the end of the webinar.</div>
<div class="section post-body">
<p>So, with that we&#8217;re going to get started. Again, we appreciate everyone taking the time today to listen to what we have to say and learn about our product, and learn about some of the new features. If you&#8217;re on here and you&#8217;re an existing customer, that you&#8217;ll learn a little bit about one of our new features. So, today we&#8217;re going to be talking a lot about security, that&#8217;s really the focus of this presentation. NetFlow in general, and CySight in particular can do a lot of things with the data that we have, and one of those things is really focused on being able to identify security threats to your network.</p>
<p>This is obviously very important, right? I mean you literally cannot go a day anymore without hearing of some company, some organization out there that&#8217;s been attacked or that has been infiltrated. I was reading about a hospital system recently that was held up by a Ransomware company, and actually had to pay money to unlock their files and this is not a home user, this is not a person who opened up the wrong email and their desktop got under attack or held for ransom. This is a legitimate hospital organization that had that happened to them and so, it really underscores the pervasiveness of these kinds of attacks.</p>
<p>Crawlers, botnets, Ransomware, they&#8217;re finding new ways to cause denial of service attacks and other kinds of attacks that can put your business or organization at an extremely high risk and, your network could be used to download or host illicit materials, leak intellectual property. That&#8217;s another thing that we&#8217;ve seen, this sort of cybercrime. Intellectual property cybercrime where it&#8217;s not that they&#8217;re just trying to bring down your site or bring down your network, but they&#8217;re actually trying to take intellectual property out and again, either hold it for ransom or just sell it or whatever it may be. So, this is certainly an important topic.</p>
<p>There are a number of major challenges for security teams to try and figure out what&#8217;s going on and how to lock down that network. The sophistication of the cybercrime organizations out there is just growing and growing. They&#8217;re always seemingly one step ahead of the for-profit companies that are trying to block them; the anti-virus companies, firewall companies and so forth. The growing complexity of the infrastructure is making it more difficult, there&#8217;s not a single point of entry and exit anymore. You&#8217;ve got BYOD, you&#8217;ve got lots of wireless, you&#8217;ve got VPNs, cloud-based services, you&#8217;ve got all kinds of things that people are using today. So it&#8217;s not just a lock it down at the firewall and we&#8217;re good, it&#8217;s really all over the place, and you need to be able to look at the traffic to understand what&#8217;s going on.</p>
<p>Of course, it&#8217;s very difficult or can be very difficult to retain and analyze that network transaction data across a big organization. Again, you have lots of lots of systems, lots of points of entry and exit, and it can be a challenge to really be able to collect all of that data and be able to use it. Because of that, because of the highly complicated and complex nature of networks, we&#8217;ve got this graphic here that talks about the really scary things that are out there. About do you know where things are happening? Do you&#8230;? You have certain aspects that you know and that you maybe know that you don&#8217;t know, but the really scary stuff is when you don&#8217;t know what you don&#8217;t know, right? It&#8217;s happening or could be happening and you have no idea, and you don&#8217;t even know that you should be looking at that, or could be looking at that data to try and understand what&#8217;s going on.</p>
<p>But in fact, products like ours and technologies like ours, allow you to, or allow a system to be watching for those unknown unknowns all the time. So, it&#8217;s not something that you wake up in the morning and say, “I&#8217;m going to go, look at this.” It&#8217;s actually happening in the background and looking for you. That machine learning capability is really what makes the new level of systems like ours trying&#8230; you know being able to catch up with the sophistication of the attack profiles out there.</p>
<p>When there is an attack or when there is a detection of something, then Incident Response Teams always have to look at that communications component, right? So, they&#8217;re going to look at hardware, they&#8217;re going to look at software, but they also have to look at the communications. They have to look at historical behavior, they have to look to see if there&#8217;s been data breaches, they have to look to see if there&#8217;s been internal threats.</p>
<p>There is a certain percentage, depending on who you talk to, 30%, 35%, 40% of data breaches happen from the inside out. So, these are internal employees who have access to something that they shouldn&#8217;t, and they email that out or they otherwise try to get that data out of the network. Of course, there&#8217;s the external threats from bad actors, those malicious types that are probing, probing, probing trying to find holes to get in and do whatever, the nefarious things that they&#8217;re trying to do.</p>
<p>So, being able to have some insight into the nature of how those systems, all of your systems communicate with each other and how they have communicated is critical. It&#8217;s really about being able to go from the blind area into a much more aware and certain area, right? So, do you really have&#8230; and thinking about, do you really have visibility in terms of what&#8217;s going on inside your network, because if you don&#8217;t, that can certainly hurt you.</p>
<p>The way we look at it, there&#8217;s the very basic things that virtually everybody has. Everybody has a firewall, most people have virus protection on their desktops. That sort of blocking and tackling, very basic prevention at the edge of a network is only a piece, right? It is not the most effective place anymore. You have to have it, we certainly wouldn&#8217;t tell you not to have it, but if you really want to move to a defense in depth, then it&#8217;s more than just trying to put up a blocking of things coming in. It&#8217;s being able to look at the live traffic and see what&#8217;s happening and identify if there are threats going on that got through. If something gets through the defenses that you have, how can you then further identify that it has happened and what&#8217;s going on? If you just think, “Well, I&#8217;ve got this firewall and I got my rules setup and I&#8217;m good, nothing can ever touch me,” and don&#8217;t look any further, then you&#8217;re really setting yourself up for a failure.</p>
<p>So, the way we approach the problem as a piece of this overall security landscape, is through the use of NetFlow information. So, NetFlow&#8217;s been around for a long time, it&#8217;s a quite a mature technology. But the great thing about it is, it&#8217;s continually even further maturing as we go on. What used to be sort of a traffic accounting product only, that was based on data coming from core routers and switches, has now been extended out to other systems in the network. Things like wireless LAN controllers, cloud servers, firewalls themselves. You can get the data from taps and probes that collect passively information about data traffic, and then turn that into a NetFlow export that can be sent to us that we can read.</p>
<p>Virtually every vendor&#8230; certainly every major vendor out there supports Flow in some way … Cisco of course is NetFlow and we use the term NetFlow to generically mean all of the various Flow types out there.  Jflow from Juniper, anything that&#8217;s IPFIX compatible as the standard, and some of the other kind of specialized versions of Flow, if you will. But all of them have the common theme that they&#8217;re going to look at that traffic and they&#8217;re going to be able to send that metadata to a collector like ours and then we can use that information intelligently to help both give you and allow you to report on and look deeply into the data, but also, and what we&#8217;re going to be talking about today, is really using that intelligence that&#8217;s built into the product to be able to identify threats, look at anomalies. Not just show you who your top talkers were, but actually say, “Hey, look. We&#8217;ve identified people that are communicating to known bad actors out there,” or, “We&#8217;ve seen an unusual bit of behavior in traffic between here and there, and this is something that really needs to be investigated.”</p>
<p>Talking about more of the specifics about how we do that. There&#8217;s two major pieces we&#8217;re going to be focusing on today. The first one is Anomaly Detection. Anomaly Detection for us means that we can baseline your network and the traffic on your network across a number of different dimensions. There&#8217;s actually quite a few metrics that we&#8217;re watching, some of the ones you could see below like flows, and packets, and bytes, and bits per second, packet size, it can be flags, it can be counts it can be all kinds of different metrics, and we can baseline each of them over time, across all of your interfaces or potentially even other aspects. So, it could be a specific conversation or a specific application, but at its most basic level through all of your interfaces to understand what is normal and what is normal activity for that time of day, that day of the week from those devices or whatever it may be.</p>
<p>Then of course, once we know what is normal, we can detect any activity that deviates from that normal baseline, right? This gives you a really great way of watching traffic 24/7 for things that you wouldn&#8217;t potentially pick up if you were just you know kind of eyeballing it if you will, or waiting certainly for someone to contact you and say there&#8217;s a problem. So, the statistical power of an application to be doing this behind the scenes and running all the time, and noticing things that you wouldn&#8217;t notice in the middle of the night, is incredibly useful for this sort of thing and then when we do detect an anomaly, we move into phase two as we call it, into diagnostics? So, diagnostics says, “Okay, there&#8217;s been some anomaly that has been detected, let&#8217;s look at this. Let&#8217;s figure out what&#8217;s going on here. We then kick off this diagnostic approach, which qualifies the cause and impact for each offending behavior breach. We&#8217;re looking it for KPIs that are specific to things like DOS attacks or scanners or sweepers or peer-to-peer activity. We roll all of that information up into a single ticket so to speak, for you on a screen that you can very easily look at and understand exactly what&#8217;s going on. When did it happen? Where did it happen? What was involved? What baseline was breached? What does that mean? What could that possibly be?</p>
<p>You can also do of course advance things like intelligent whitelisting. You can send the information out of our system up to another system that you may have, like an ITSM or trouble ticket system, via SNMP and via email and so forth. So, really this again this is the intelligent piece of the product with machine learning as its background. So it&#8217;s doing this whether you&#8217;re watching it or not. It&#8217;s looking for those baseline breaches and then when we see them, it&#8217;s really coordinating all of the information about what happened into a single easy-to-use place, which you can then drill down into using all of our standard features to try and identify other things that are happening or where do you need to go next.</p>
<p>Anomaly Detection or NBAD as you may hear us talk about it, has been in the product for a number of years now. So, that&#8217;s not something new, it&#8217;s continually being improved, and it&#8217;s a wonderful piece of the product, and it&#8217;s been there for a while.</p>
<p>The new thing that we have introduced and are introducing is what we call our Endpoint Threat Detection. So this is another module added onto the product that adds additional security capabilities while still utilizing all of the things that you typically utilize. So we&#8217;re still taking the data from NetFlow information but now we are applying to that information other outside data sources that we have, basically using some big data threat feeds collated from multiple sources that you can match up to or coordinate with the information about your traffic.</p>
<p>So, I&#8217;ve got information about my traffic, I&#8217;ve had that. Now, I&#8217;ve got information about what is bad in the world and in real time, where known bad actors, known bad IP addresses, Ransomware, malware, DDoS attacks, Tor and so forth are coming from and then looking at the two of them and saying, “Are any of my people talking to those things?” At the very most basic level that&#8217;s what we&#8217;re looking for, right? So, it&#8217;s things global in terms of getting all of these feeds and using pattern matching, and Anomaly Detection and so forth, and then it&#8217;s acting very local against the traffic that you have in your network.</p>
<p>This capability of having network connection logging or NetFlow, just as everybody in the industry agrees, is one of the best places that you can get this data. It&#8217;s almost impossible to get the kind of granular level of information from any other source. Especially if you are held to any sort of standard in terms of retention or policies around not being able to look directly into the data. If you&#8217;ve got compliance requirements that say, “Hey, I can&#8217;t store my customers’ data.” That is fine with NetFlow because NetFlow is not looking inside the packets; it&#8217;s looking at the metadata. Who&#8217;s talking to whom, and when are they doing it, and how much talking are they doing and so forth. But it&#8217;s not actually reading an e-mail or anything inside of that. So, you&#8217;re not going to run into a foul of any of those regulatory problems, but you&#8217;re still able to get a huge amount of benefit from a network investigation using that data.</p>
<p>It&#8217;s important that even without content, NetFlow provides an excellent means of guiding that investigation because there&#8217;s still so much data there. As it&#8217;s called in our world, metadata &#8211; Data about the data! There&#8217;s still so much information there. But what&#8217;s great also is that, you don&#8217;t have to retain content… unlike let&#8217;s say a probe or other type of system that is collecting every bit and byte. You run into problems there too, they&#8217;re expensive, and you run into storage requirements trying to store historically every conversation including the data, over a long period of time is just incredibly expensive and incredibly unwieldy to do. The amount of storage you have to have to be able to do that, and the difficulty in quickly and effectively retrieving that information and searching for things, just becomes next to impossible. But when you can still get the same benefit of what you need to look at from a security standpoint without those complications of price and just the logistics of handling it all, you end up with having a really valuable product and that&#8217;s what NetFlow can give to you.</p>
<p>So, with our Endpoint threat Detection, I&#8217;ve got a few screens here that can really dive down into what it looks like and how it works. Again, we&#8217;ve got these big data feeds of threat information out there in the world, collected from various sources, and honeypots and so forth and we&#8217;re continuously then monitoring for communications with those IPs of poor reputation. So, you&#8217;ve got your communication that we can see because of NetFlow, and you&#8217;ve got these known bad actors out there that we know about. We can match up those two pieces of information and when we do it, we&#8217;re not just saying it happened, but we&#8217;re giving you much more detail about it happening. So, if we kind of zoom in here a little bit, threat data can be seen in summary or in detail. We&#8217;ve got a categorization of what&#8217;s happening and different threat types. So, I can see this is a peer-to-peer kind of thing, is this known malware, is it Tor, is it an FTP or an SSH attacker? What kind of thing is happening from or on these known bad IP address?</p>
<p>So, from a high of macro level you can see what the threat categories are and what the threat types are and then of course, you can drill down using the standard CySight tools to investigate them and provide complete visibility into that threat. So, now I&#8217;ve seen it, I have traffic that&#8217;s been identified as a threat. I can use our drill down, right-click, or however you want to do it capability. In this case we&#8217;re showing a right-click on threat detection and saying show me the affected IP addresses. I want to know, let&#8217;s drill down and see in this case on Ransomware, command and control Ransomware what the infected IP addresses are and then you&#8217;re going to get into the individual affected IPs, the threat IP where it&#8217;s coming from and, how much traffic was done?</p>
<p>These are Ransomware-type attacks, and I can see this is happening in my network at this period of time and I can even then of course change the view to be a time view. When did this start? Has this been a long-lived thing that&#8217;s been going on over a period of time where it&#8217;s been sucking information out of my organization, or did this pop off and go away? And if it did, when did that happen? All of that kind of deep level investigation is something that you can get using all of the normal tools that we have. You can get this deep dive investigation of traffic for regular traffic. Not just malicious traffic, but just using our tool for what I&#8217;ll call normal traffic accounting. Who is talking to who and when, is all available to you and more now with the threat detection features.</p>
<p>So, we&#8217;re watching for those threats, we&#8217;ve identified them and then using all of the common things that you&#8217;re used to using if you&#8217;re already a customer of ours, being able to identify or drill down into that data and provide those reports when you want to see it.</p>
<p>Here&#8217;s another example: let&#8217;s look at threat-port usage over the last few hours. So, it&#8217;s may be a couple hour time frame and I can see specifically which ports, which protocols have been detected as potential threats. What kind of threats, of course again how much traffic did they use? How long has this gone on for, and so forth. So, you can in fact in this case, know that increasing Tor usage. That we&#8217;ve highlighted in yellow and green &#8230; but you can also notice it&#8217;s been this continual botnet chatter, this red line. It&#8217;s just been going on and on forever, and that&#8217;s obviously something that needs to be absolutely looked into. It might be very difficult to find this in any other way, it&#8217;s just ongoing background chatter that&#8217;s been happening. It may not spike to anything that&#8217;s incredibly large that would set off a threshold alert, or maybe not even set off an anomaly alert. But, we&#8217;ve identified this is being definitely an issue because it&#8217;s communicating to something that we know is bad out there.</p>
<p>Of course you have all of the common reporting type tools. So, you can automate those threats, I want a threat report every hour emailed to me, or every day, or whatever makes sense or a roll up report every month to provide to management to say, okay, over the last 30 days, here are all the threats that were identified as happening in our network, and then here&#8217;s what&#8217;s been remediated, here&#8217;s what we&#8217;ve blocked, here&#8217;s what we&#8217;ve stopped, here&#8217;s what we&#8217;ve fixed, here&#8217;s what we&#8217;ve cleaned up kind of thing and all of those reports that look good and can be scheduled in a great for both live use and for management, are part of and parcel of the product that we&#8217;ve been delivering for over a decade now.</p>
<p>As well as those deep dive threats forensics. So the high level reports are good for some people but the deep dive of course reports are important for other people and that&#8217;s something that we can give you because we store an archive all of this flow information, it&#8217;s not just the top 100, or the top 500, it&#8217;s the top 5,000 or 10,000 or every single Flow using our compliance version. The compliance version store has the ability to store all of those flows all the time for you to pull up and review may not have been yesterday, it may have been last week or last month or six months ago or whenever. You can still drill in, you can still see every individual flow in terms of IPs, source and destination and ports and protocols interfaces and all of that kind of information. It gives you that super granular capability that you&#8217;re just not going to find anywhere else.</p>
<p>We also try to give you different viewpoints; we&#8217;re very big on flexibility in terms of giving you an easy-to-understand way of looking at the traffic. Some people like to view numbers and other people like to view pictures, and there&#8217;s lots of ways that we can show that data to you. The visualization capability is outstanding within our product and one of the ways that that can be really useful. We&#8217;ve got this example here of a Tor correlation attack. So, it&#8217;s de-anonymizing Tor is a difficult but super important issue within the world of identifying Tor, and so for us, when we see that there has been Tor traffic we can build this visualization and we can see all the different places that that Tor traffic has hopped to within your network or in and out of your network and that really gives you a way to get in and say, “Okay, I need to look here, I need to stop at here, I need to stop at there.” From a service provider perspective, this can be a really, really useful example of what we can do in the power of our product.</p>
<p>So with the last few minutes here, I know we&#8217;re getting close to the time frame, but we do want to talk about the many options you have in terms of our scalable architecture. Whether you are small or mid-size organization, or very, very large organization, we have a way of delivering our product to you. It could be in a single standalone environment with a single database and single software installation, it could be as you grow and maybe you have various components of traffic that are disseminated globally, and you need local collection, we can do that. So, we can offer split off collectors or helper collectors that communicate up to a single master database or we can even do multi-site server, multi-database hierarchical architecture for really, really massively scaled organizations. So, no matter who you are, if you’re listening to this, if you&#8217;re just small organization with one site and a few devices, or a massively global corporation with thousands of devices and data traversing it in many different areas, we can fit your organization and we can architect a solution that is right for you.</p>
<p>We&#8217;ve got a number of exciting features one of the great things about us is that, we never stop developing and we never stop investigating what the best things are to add to the product. We&#8217;ve got some really cool enhancements coming on, all things that people have asked about or have inquired about, or we&#8217;ve decided to build on our own and we love talking to our customers.</p>
<p>Our best source of future development is request from our customers. So, anything that you can think of I can&#8217;t guarantee that that our team will do it, but I can certainly guarantee you that we&#8217;ll listen to you and we&#8217;ll think about it and we&#8217;ll do our absolute best to solve whatever issue you may have and because of our commitment to our customers and our willingness to listen to them, we really have built up a wonderful group of customers. You can see a few of their logos on the screen here again, everything from traditional organizations enterprises to service providers, educational institutions, Telco’s, whatever it may be, we can handle it and we&#8217;d love if you&#8217;re not already a customer of ours, but you&#8217;re listening to this webinar, certainly we&#8217;d love to have your logo on this list in the future and we feel like once you get to working with us and really get used to our product, you&#8217;re going to be super thrilled about how we do things. What we offer to you and the support we provide to you.</p>
<p>So, with that I think we&#8217;re at the end of the presentation, almost exactly right on time here, about 30 minutes. So, I want to thank everyone for taking the time to join today, as always it does not look like we have&#8230; I&#8217;m just looking. Does not look like we have any questions right now, so, if you do have any now would be the time to type them in. But if not, we just want to thank you for joining us today. This presentation has been recorded and will be available to any of the folks who registered, and it&#8217;ll eventually make it up into the website. So, please check it out. Also please check out our website for other information about future webinars or other documentation that we have, there&#8217;s a lot of good resources up there and we invite you to take a look at those and certainly if you have any questions to reach out to us either to the sales team or the support or engineering team depending on what you&#8217;re interested in.</p>
<p>So, with that, I&#8217;ll end the session and I look forward to speaking with all of you at some point in the future.</p>
<p>Thanks.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div id="s3gt_translate_tooltip" class="s3gt_translate_tooltip" style="position: absolute; left: 88px; top: 9273px; opacity: 0;"></div>
<p>The post <a href="https://cysight.ai/end-point-threat-detection-using-netflow-analytics/">End Point Threat Detection Using NetFlow Analytics</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Ways Flow Based Network Monitoring Solutions Need to Scale</title>
		<link>https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 19 Sep 2024 10:10:22 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://www.netflowauditor.com/5-ways-flow-based-network-monitoring-solutions-need-to-scale-2/</guid>

					<description><![CDATA[<p>Partial Truth Only Results in Assumptions A common gripe for Network Engineers is that their current network monitoring solution doesn’t provide the depth of information needed to quickly ascertain the true cause of a network issue. Imagine reading a book that is missing 4 out of every 6 words, understanding the context will be hopeless...</p>
<p>The post <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">5 Ways Flow Based Network Monitoring Solutions Need to Scale</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="14464" class="elementor elementor-14464" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-12d97b5 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="12d97b5" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5c8f7556" data-id="5c8f7556" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-5ea6fe34 elementor-widget elementor-widget-text-editor" data-id="5ea6fe34" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<div>
<h2><span style="color: #000000;"><strong>Partial Truth Only Results in Assumptions</strong></span></h2>
<p><span style="color: #000000;">A common gripe for Network Engineers is that their current network monitoring solution doesn’t provide the depth of information needed to quickly ascertain the true cause of a network issue. Imagine reading a book that is missing 4 out of every 6 words, understanding the context will be hopeless and the book has near to no value. </span><span style="color: #000000;">Many already have over-complicated their monitoring systems and methodologies by continuously extending their capabilities with a plethora of add-ons or relying on disparate systems that often don’t interface very well with each other. </span><span style="color: #000000;">There is also an often-mistaken belief that the network monitoring solutions that they have invested in will suddenly give them the depth they need to have the required visibility to manage complex networks.</span></p>
<p><span style="color: #000000;">A best-value approach to NDR, NTA and general network monitoring is to use a flow-based analytics methodology such as NetFlow, sFlow or IPFIX.</span></p>
<p></p>
<h2><span style="color: #000000;"><strong>The Misconception &amp; What Really Matters</strong></span></h2>
<p><span style="color: #000000;">In this market, it’s common for the industry to express a flow software’s scaling capability in flows-per-second. </span><span style="color: #000000;">Using Flows-per-second as a guide to scalability is misleading as it is often used to hide a flow collector’s inability to archive flow data by overstating its collection capability and enables them to present a larger number considering they use seconds instead of minutes. </span><span style="color: #000000;">It’s important to look not only at flows-per-second but to understand the picture created once all the elements are used together. Much like a painting of a detailed landscape, the finer the brush and the more colors used will ultimately provide the complete and truly detailed picture of what was being looked at when drawing the landscape.</span></p>
<p><span style="color: #000000;">Granularity is the prime factor to start focusing on, specifically referring to granularity retained per minute (flow retention rate). Naturally, speed impediment is a significant and critical factor to be aware of as well. The speed and flexibility of alerting, reporting, forensic depth, and diagnostics all play a strategic role but will be hampered when confronted with scalability limitations. Observing the behavior when impacted by high-flow-variance or sudden-bursts and considering the number of devices and interfaces can enable you to appreciate the absolute significance of scalability in producing actionable insights and analytics.&nbsp; Not to mention the ability to retain short-term and historical collections, which provide vital trackback information, would be nonexistent. To provide the necessary visibility to accomplish the ever-growing number of tasks analysts and engineers must deal with daily along with resolving issues to completion, </span><span style="color: #000000;">NDR, NTA and general </span><span style="color: #000000;">Network Monitoring System (NMS) must have the ability to scale in all its levels of consumption and retention.</span></p>
<p></p>
<h2><span style="color: #000000;"><strong>How Should Monitoring Solutions Scale?</strong></span></h2>
<p><span style="color: #000000;">Flow-Based Network Detection and Response (NDR) / Network Traffic Analysis (NTA) software needs to scale in its collection of data in five ways:</span></p>
<p><span style="color: #000000;"><strong>Ingestion Capability</strong> – Also referred to as <strong>Collection,</strong> means the number of flows that can be consumed by a single collector. This is a feat that most monitoring solutions are able to accomplish, unfortunately, it is also the one they pride themselves on. It is an important ability but is only the first step of several crucial capabilities that will determine the quality of insights and intelligence of a monitoring system. Ingestion is only the ability to take in data, it does not mean “retention”, and therefore could do very little on its own.</span></p>
<p><span style="color: #000000;"><strong>Digestion Capability</strong> – Also referred to as <strong>Retention,</strong> means the number of flow records that can be retained by a single collector. The most overlooked and difficult step in the network monitoring world. Digestion / Flow retention rates are particularly critical to quantify as they dictate the level of granularity that allows a flow-based NMS to deliver the visibility required to achieve quality Predictive AI Baselining, Anomaly Detection, Network Forensics, Root Cause Analysis, Billing Substantiation, Peering Analysis, and Data Retention compliance. Without retaining data, you cannot inspect it beyond the surface level, losing the value of network or cloud visibility.</span></p>
<p><span style="color: #000000;"><strong>Multitasking Processes</strong>&#8211; Pertains to the multitasking strength of a solution and its ability to scale and spread a load of collection processes across multiple CPUs on a single server.&nbsp; This seems like an obvious approach to the collection but many systems have taken a linear serial approach to handle and ingest multiple streams of flow data that don&#8217;t allow their technologies to scale when new flow generating devices, interfaces, or endpoints are added forcing you to deploy multiple instances of a solution which becomes ineffective and expensive.<br></span></p>
<p><span style="color: #000000;"><strong>Clustered Collection</strong> &#8211; Refers to the ability of a flow-based solution to run a single data warehouse that takes its input from a cluster of collectors as a single unit as a means to load balance. In a large environment, you mostly have very large equipment that sends massive amounts of data to collectors. In order to handle all that data, you must distribute the load amongst a number of collectors in a cluster to multiple machines that make sense of it instead of a single machine that will be overloaded. This ability enables organizations to scale up in data use instead of dropping it as they attempt to collect it.</span></p>
<p><span style="color: #000000;"><strong>Hierarchical Correlation</strong> – The purpose of Hierarchical correlation is to take information from multiple databases and aggregate them into a single <strong>Super SIEM</strong>. With the need to consume and retain huge amounts of data, comes the need to manage and oversee that data in an intelligent way. Hierarchical correlation is designed to enable parallel analytics across distributed data warehouses to aggregate their results. In the field of network monitoring, getting overwhelmed with data to the point where you cannot find what you need is a as useful as being given all the books in the world and asked a single question that is answered in only one.</span></p>
<p>Network traffic visibility is considerably improved by reducing network blindspots and providing qualified sources and reasons of communications that impair business continuity.The capacity to capture flow at a finer level allows for new Predictive AI Baselining and Machine Learning application analysis and risk mitigation.</p>
<p><span style="color: #000000;">There are so many critical abilities that a network monitoring solution must enable its user, all are affected by whether or not the solution can scale.<br></span></p>
<p><span style="color: #000000;">Visibility is a range and not binary, you do not have or don’t have visibility, its whether you have enough to achieve your goals and keep your organization productive and safe.</span></p>
</div>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://cysight.ai/5-ways-flow-based-network-monitoring-solutions-need-to-scale/">5 Ways Flow Based Network Monitoring Solutions Need to Scale</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How NetFlow Solves for Mandatory Data Retention Compliance</title>
		<link>https://cysight.ai/how-netflow-solves-for-mandatory-data-retention-compliance/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 08 Aug 2024 11:24:12 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=96</guid>

					<description><![CDATA[<p>Compliance in IT is not new and laws regulating how organizations should manage their customer data exist such as: HIPPA, PCI, SCADA and Network transaction logging has begun to be required of business. Insurance companies are gearing up to qualify businesses by the information they retain to protect their services and customer information. Government and industry...</p>
<p>The post <a href="https://cysight.ai/how-netflow-solves-for-mandatory-data-retention-compliance/">How NetFlow Solves for Mandatory Data Retention Compliance</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>Compliance in IT is not new and laws regulating how organizations should manage their customer data exist such as: HIPPA, PCI, SCADA and Network transaction logging has begun to be required of business. Insurance companies are gearing up to qualify businesses by the information they retain to protect their services and customer information. Government and industry regulations and enforcement are becoming increasingly stringent.</p>
<p>Most recently many countries have begun to implement Mandatory Data Retention laws for telecom service providers.</p>
<p>Governments require a mandatory data retention scheme because more and more crime is moving online from the physical world and ISP‘s are keeping less data and retaining it for a shorter time. This negatively impacts the investigative capabilities of law enforcement and security agencies that need timely information to help save lives by early spotting lone-wolf terrorists or protect vulnerable members of society from abuse by sexual deviants, ransomware or other crimes online.</p>
<p>Although there is no doubt as to the value of mandatory data retention schemes they are not without justifiable privacy, human rights and expense concerns to implement.</p>
<p>It takes a lot of cash, time and skills that many ISP’s and companies simply cannot afford. Internet and managed service providers and large organizations must take proper precautions to remain in compliance. Heavy fines, license and certification issues and other penalties can result from non-compliance with mandatory data retention requirements.</p>
<p><a href="https://www.ag.gov.au/dataretention">According to the Australian Attorney-General’s Department</a>, Australian telecommunications companies must keep a limited set of metadata for two years. Metadata is information about a communication (the who, when, where and how)—not the content or substance of a communication (the what).</p>
<p>A commentator from the Sydney morning herald <a href="https://www.smh.com.au/technology/technology-news/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html" target="_blank" rel="noopener noreferrer">qualified</a>“…Security, intelligence and law enforcement access to metadata which overrides personal privacy is now in contention worldwide&#8230;” and speculated that with the introduction of Australian metadata laws that “…this country&#8217;s entire communications industry will be turned into a surveillance and monitoring arm of at least 21 agencies of executive government. …”.</p>
<p>In Australia many smaller ISP’s are fearful that failing to comply will send them out of business. Internet Australia&#8217;s Laurie Patton said, &#8220;It&#8217;s such a complicated and fundamentally flawed piece of legislation that there are hundreds of ISPs out there that are still struggling to understand what they&#8217;ve got to do&#8221;.</p>
<p>As for the anticipated costs, a survey sent to ISPs by telecommunications industry lobby group Communications Alliance found that  “There is a huge variance in estimates for the cost to business of implementing data retention &#8211; 58 per cent of ISPs say it will cost between $10,000 and $250,000; 24 per cent estimate it will cost over $250,000; 12 per cent think it will cost over $1,000,000; some estimates go as high as $10 million.”</p>
<p>An important cost to consider in compliance is the ease of data reporting when requested by government or corporate compliance teams to produce information for a specific ipv4 or ipv6 address. If the data is stored in a data-warehouse that is difficult to filter this may cause the service provider to incur penalties or be seen to be non-complying. Flexible filtering and automated reporting is therefore critical to produce the forensics required for the compliance in a timely and cost effective manner.</p>
<p>Although there are different laws governing different countries the main requirement of mandatory data retention laws at ISP’s is to maintain sufficient information at a granular level in order to assist governments in finding bad actors such as terrorists, corporate espionage, ransom-ware and pedophiles. In some countries this means that telcos are required to keep data of the IP addresses users connect to, for up to 10 weeks and in others just the totals of subscriber usage for each IP used for up to 2 years.</p>
<p>Although information remains local to each country and governed by relevant privacy laws, the benefits to law enforcement in the future will eventually provide the ability to have the visibility to track relayed data such as communications used by Tor Browsers, Onion routers and Freenet beyond their relay and exit nodes.</p>
<p>There is no doubt in my mind that with heightened states of security and increasing online crime there is a global need for governments to intervene with online surveillance to protect children from exploitation, reduce terrorism and to build defensible infrastructures whilst at the same time implementing data retention systems that have the inbuilt smarts to enable a balance between compliance and privacy rather than just a blanket catch all. There is already an <a href="https://cysight.ai/free-trial">available solution</a> for the Internet communications component based on Netflow that assists ISP’s to quickly comply at a low cost whilst properly allowing data retention rules to be implemented to limit intruding on an individual’s privacy.</p>
<p>NetFlow solutions are cheap to deploy and are not required to be deployed at every interface such as a packet analyzer and can use the existing router, switch or firewall investment to provide continuous network monitoring across the enterprise, providing the service provider or organization with powerful tools for data retention compliance.</p>
<p>NetFlow technology if sufficiently scalable, granular and flexible can deliver on the visibility, accountability and measurability required for data retention because it can include features that:</p>
<ul>
<li>Supply a real-time look at network and host-based activities down to the individual user and device;</li>
<li>Increase user accountability for introducing security risks that impact the entire network;</li>
<li>Track, measure and prioritize network risks to reduce Mean Time to Know (MTTK) and Mean Time to Repair or Resolve (MTTR);</li>
<li>Deliver the data IT staff needs to engage in in-depth forensic analysis related to security events and official requests;</li>
<li>Seamlessly extend network and security monitoring to virtual environments;</li>
<li>Assist IT departments in maintaining network up-time and performance, including mission critical applications and software necessary to business process integrity;</li>
<li>Assess and enhance the efficacy of traditional security controls already in place, including firewalls and intrusion detection systems;</li>
<li>Capture and archive flows for complete data retention compliance</li>
</ul>
<p>Compared to other analysis solutions, <a href="https://cysight.ai">NetFlow</a> can fill in the gaps where other technologies cannot deliver. A well-architected NetFlow solution can provide a comprehensive landscape of tools to help business and service providers to achieve and maintain data retention compliance for a wide range of government and industry regulations.</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img loading="lazy" decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/how-netflow-solves-for-mandatory-data-retention-compliance/">How NetFlow Solves for Mandatory Data Retention Compliance</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</title>
		<link>https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 07:07:14 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Advanced Netflow]]></category>
		<category><![CDATA[Flexible]]></category>
		<category><![CDATA[Granular]]></category>
		<category><![CDATA[Scalable Netflow]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=10</guid>

					<description><![CDATA[<p>Why is flows per second a flawed way to measure a netflow collector&#8217;s capability? Flows-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer’s flow capture (aka collection) rate. This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right?...</p>
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="Default"><strong><span lang="EN-US"> Why is flows per second a flawed way to measure a netflow collector&#8217;s capability?</span></strong></h3>
<p class="Default">Flows<span lang="EN-US">-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer</span><span lang="EN-US">’</span><span lang="EN-US">s flow capture (aka collection) rate.</span></p>
<p class="Default"><span lang="EN-US">This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right? Well, yes and no.</span></p>
<p class="Default"><strong><span lang="EN-US">The Basics<br />
</span></strong></p>
<p class="Default"><span lang="EN-US">NetFlow was originally conceived as a means to provide network professionals the data to make sense of the traffic on their network without having to resort to expensive per segment based packet sniffing tools.</span></p>
<p class="Default"><span lang="EN-US">A flow record contains at minimum the basic information pertaining to a transfer of data through a router, switch, firewall, packet tap or other network gateway. A typical flow record will contain at minimum: Source IP, Destination IP, Source Port, Destination Port, Protocol, Tos, Ingress Interface and Egress Interface. Flow records are exported to a flow collector where they are ingested and information orientated to the engineer</span><span lang="EN-US">’</span><span lang="EN-US">s purposes are displayed.</span></p>
<p class="Default"><strong><span lang="EN-US">Measurement</span></strong></p>
<p class="Default"><span lang="EN-US">Measurement has always been how the </span>IT industry express<span lang="EN-US">es</span> <span lang="EN-US">power and competency. However, a formula used to reflect power and ability changes when a technology design undergoes a paradigm shift.</span></p>
<p class="Default"><span lang="EN-US">For example, when expressing how fast a computer is we used to measure the CPU clock speed. We believed that the higher the clock speed the more powerful the computer. However, when </span><span lang="IT">multi-core chips</span><span lang="EN-US"> were introduced the CPU power and </span><span lang="NL">speed </span><span lang="EN-US">dropped but the CPU in fact became more powerful. The primary clock speed measurement indicator became secondary to the ability to multi-thread.</span></p>
<p class="Default"><span lang="EN-US">The f</span>lows<span lang="EN-US">-per-second yardstick is misleading as it incorrectly reflects the actual power and capability of a flow collector to capture and process flow data and it has become prone to marketing exaggeration.</span></p>
<p class="Default"><strong><span lang="EN-US">Flow Capture Rate</span></strong></p>
<p class="Default"><span lang="EN-US">Flow capture rate ability is difficult to measure and to quantify a products scalability. There are various factors that can dramatically impact the ability to collect flows and to retain</span> <span lang="EN-US">sufficient </span>flows<span lang="EN-US"> to perform higher-end diagnostics.</span></p>
<p class="Default"><span lang="EN-US">I</span>t<span lang="FR">’</span><span lang="EN-US">s important to look not just at flows-per-second but at the granularity retained per minute (flow retention rate), the speed and flexibility of alerting, reporting, forensic depth and diagnostics and the scalability when impacted by high-flow-variance, sudden-bursts, number of devices and interfaces, the speed of reporting over time, the ability to retain short-term and historical collections and the confluence of these factors as it pertains to scalability of the software as a whole.</span></p>
<p class="Default"><span lang="EN-US">Scalable NetFlow and flow retention rates are particularly critical to determine as appropriate granularity is needed to deliver the visibility required to perform A</span>nomaly <span lang="EN-US">Detection, Network Forensics, Root Cause Analysis, Billing substantiation, Peering Analysis and Data retention compliance.</span></p>
<p class="Default"><strong><span lang="EN-US">The higher the flows-per-second and the flow-variance the more challenging it becomes to achieve a high flow-retention-rate to archive and retain flow records in a data warehouse</span>.</strong></p>
<p class="Default">A vendor<span lang="EN-US">’</span><span lang="EN-US">s capability statement might reflect a high flows-per-second consumption ability but many</span> <span lang="EN-US">flow software </span><span lang="NL">tools </span><span lang="EN-US">have retention rate limitations by design.</span></p>
<p class="Default"><span lang="EN-US">It can mean that irrespective of achieving a high flow collection rate the netflow analyzer might only be capable of physically archiving</span> <span lang="EN-US">5</span>00 flows<span lang="EN-US"> per minute. Furthermore, these flows are usually the result of sorting the flow data by top </span>byte<span lang="EN-US">s to identify </span><span lang="EN-US">“</span><span lang="EN-US">Top 10</span><span lang="EN-US">” </span><span lang="EN-US">bandwidth abusers. Netflow products of this kind can be easily identified because they often tend to offer benefits orientated primarily to identifying bandwidth abuse or network performance monitoring.</span></p>
<p class="Default"><span lang="EN-US">Identifying bandwidth abusers is of course a very important benefit of a netflow analyzer. However, it has a marginal benefit today where a large amount of the abuse and risk is caused by many small flows.</span></p>
<p class="Default"><span lang="EN-US">These small flows usually fall beneath the radar screen of many netflow analysis products.</span>  <span lang="EN-US">Many abuses like DDoS, </span>p2p<span lang="EN-US">, botnets</span> <span lang="EN-US">and hacker or insider data exfiltration continue to occur and can at minimum impact the networking equipment and user experience. Lack of ability to quantify and understand small flows creates great risk leaving organizations exposed.</span></p>
<p class="Default"><strong><span lang="EN-US">Scalability</span></strong></p>
<p class="Default"><span lang="EN-US">This inability to scale in short-term</span> <span lang="EN-US">or historical analysis severely impacts a flow monitoring product</span><span lang="EN-US">’</span><span lang="EN-US">s ability to collect and retain critical information required in today</span><span lang="EN-US">’</span><span lang="EN-US">s world where copious data has created severe network blind spots</span>.</p>
<p class="Default"><span lang="IT">To qualify </span><span lang="EN-US">if a tool is really suitable for the purpose, you need to know more about the flows-per-second collection formula being provided by the vendor and <a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">some deeper investigation</a></span> <span lang="EN-US"><a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">should be carried out to qualify the claims</a>.</span></p>
<p class="Default"><strong><span lang="EN-US"> </span></strong></p>
<p class="Default"><strong><span lang="EN-US">With this in mind here are 3 key questions to <a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">ask your </a></span><span lang="EN-US"><a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">NetFlow</a> vendor to understand what their collection scalability claims really mean:</span></strong></p>
<ol>
<li class="Default"><strong><span lang="EN-US">How many </span>flow<span lang="EN-US">s</span> </strong><span lang="EN-US"><strong>can be collected per second?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ol>
<ul>
<li class="Default">Qualify if the flows per second rate provided is a burst rate or a sustained rate.</li>
<li class="Default">Ask how the collection and retention rates might be affected if the flows have high-flow variance (e.g. a DDoS attack).</li>
<li class="Default">How is the collection, archiving and reporting impacted when flow variance is increased by adding many devices and interfaces and distinct IPv4/IPv6 conversations and test what degradation in speed can you expect after it has been recording for some time.</li>
<li class="Default">Ask how the collection and retention rates might change if adding additional fields or measurements to the flow template (e.g. MPLS, MAC Address, URL, Latency)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">How many </span></strong><span lang="EN-US"><strong>flow records can be retained per minute?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ul>
<ul>
<li>Ask how the actual number of records inserted into the data warehouse per minute can be verified for short-term and historical collection.</li>
<li>Ask what happens to the flows that were not retained.</li>
<li>Ask what the flow retention logic is. (e.g. Top Bytes, First N)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">What information granularity is retained for both short-term and historically</span>?</strong>
<ul>
<li><span lang="EN-US">Does the data</span><span lang="EN-US">’</span><span lang="EN-US"><span lang="EN-US">s time granularity degrade as the data ages e.g. 1 day data retained per minute, 2 days retained per hour 5 days retained per quarter</span></span></li>
<li>Can you control the granularity and if so for how long?</li>
</ul>
</li>
</ul>
<p><strong><span lang="EN-US"> </span></strong></p>
<p><strong><span lang="EN-US">Remember &#8211; Rate of collection does not translate to information retention.</span></strong></p>
<p><span lang="EN-US">Do you know what</span><span lang="EN-US">’</span><span lang="EN-US">s really stored in the software&#8217;s database? After all you can only analyze what has been retained (either in memory or on disk) and it is that information retention granularity that provides a flow products benefits.</span></p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
<p class="Default">
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Big Data &#8211; A Global Approach To Local Threat Detection</title>
		<link>https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Sat, 27 Jul 2024 09:42:51 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=55</guid>

					<description><![CDATA[<p>From helping prevent loss of life in the event of a natural disaster, to aiding marketing teams in designing more targeted strategies to reach new customers, big data seems to be the chief talking point amongst a broad and diverse circle of professionals. For Security Engineers, big data analytcs is proving to be an effective...</p>
<p>The post <a href="https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/">Big Data &#8211; A Global Approach To Local Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>From helping prevent loss of life in the event of a natural disaster, to aiding marketing teams in designing more targeted strategies to reach new customers, big data seems to be the chief talking point amongst a broad and diverse circle of professionals.</p>
<p>For Security Engineers, big data analytcs is proving to be an effective defense against evolving network intrusions thanks to the delivery of near real-time insights based on high volumes of diverse network data. This is largely thanks to technological advances that have resulted in the capacity to transmit, capture, store and analyze swathes of data through high-powered and relatively low-cost computing systems.</p>
<p>In this blog, we&#8217;ll take a look at how big data is bringing deeper visibility to security teams as environments increase in complexity and our reliance on pervading network systems intensifies.</p>
<h2><strong>Big data analysis is providing answers to the data deluge dilemma</strong></h2>
<p>Large environments generate gigabytes of raw user, application and device metrics by the minute, leaving security teams stranded in a deluge of data. Placing them further on the back foot is the need to sift through this data, which involves considerable resources that at best only provide a retrospective view on security breaches.</p>
<p>Big data offers a solution to the issue of “<em>too much data too fast</em>” through the rapid analysis of swathes of disparate metrics through advanced and evolving analytical platforms. The result is actionable security intelligence, based on comprehensive datasets, presented in an easy-to-consume format that not only provides historic views of network events, but <a href="https://cysight.ai/netflow-for-advanced-threat-detection">enables security teams to better anticipate threats as they evolve</a>.</p>
<p>In addition, big data&#8217;s ability to facilitate more accurate predictions on future events is a strong motivating factor for the adoption of the discipline within the context of information security.</p>
<h2><strong>Leveraging big data to build the secure networks of tomorrow</strong></h2>
<p>As new technologies arrive on the scene, they introduce businesses to new opportunities &#8211; and vulnerabilities. However, the application of Predictive AI Baselining analytics to network security in the context of the evolving network is helping to build the secure, stable and predictable networks of tomorrow. Detecting modern, more advanced threats requires big data capabilities from incumbent intrusion prevention and detection (IDS\IPS) solutions to distinguish normal traffic from potential threats.</p>
<p>By contextualizing diverse sets of data, Security Engineers can more effectively detect stealthily designed threats that traditional monitoring methodologies often fail to pick up. For example, Advanced Persistent Threats (APT) are notorious for their ability to go undetected by masking themselves as day-to-day network traffic. These low visibility attacks can occur over long periods of time and on separate devices, making them difficult to detect since no discernible patterns arise from their activities through the lens of traditional monitoring systems.</p>
<p>Big data Predictive AI Baselining analytics lifts the veil on threats that operate under the radar of traditional signature and log-based security solutions by contextualizing traffic and giving NOCs a deeper understanding of the data that traverses the wire.</p>
<p><a href="https://www.gartner.com/newsroom/id/2663015">Gartner states that</a>, <em>“Big data Predictive AI Baselining analytics enables enterprises to combine and correlate external and internal information to see a bigger picture of threats against their enterprises.”  </em>It also eliminates the siloed approach to security monitoring by converging network traffic and organizing it in a central data repository for analysis; resulting in much needed granularity for effective intrusion detection, prevention and <a href="https://cysight.ai/balancing-granularity-against-network-security-forensics">security forensics</a>.</p>
<p>In addition, Predictive AI Baselining analytics eliminates barriers to internal collaborations between Network, Security and Performance Engineers by further contextualizing network data that traditionally acted as separate pieces of a very large puzzle.</p>
<h2><strong>So is big data Predictive AI Baselining analytics the future of network monitoring?</strong></h2>
<p>In a way, NOC teams have been using big data long before the discipline went mainstream<em>. </em>Large networks have always produced high volumes of data at high speeds &#8211; only now, that influx has intensified exponentially.</p>
<p>Thankfully, with the rapid evolution of computing power at relatively low cost, the possibilities of what our data can tell us about our networks are becoming more apparent.</p>
<p>The timing couldn&#8217;t have been more appropriate since traditional perimeter-based IDS\IPS no longer meet the demands of modern networks that span vast geographical areas with multiple entry points.</p>
<p>In the age of cloud, mobility, ubiquitous Internet and the ever-expanding enterprise environment, big data capabilities will and should become an intrinsic part of virtually every security apparatus.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/big-data-a-global-approach-to-local-threat-detection/">Big Data &#8211; A Global Approach To Local Threat Detection</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NetFlow for Usage-Based Billing and Peering Analysis</title>
		<link>https://cysight.ai/netflow-for-usage-based-billing-and-peering-analysis/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 12:09:57 +0000</pubDate>
				<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Usage Based Billing]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=93</guid>

					<description><![CDATA[<p>Usage&#8211;based billing refers to the methods of calculating and passing back the costs of running a network to the consumers of data that occur through the network. Both Internet Service Providers (ISP) and Corporations have a need for Usage-based billing with different billing models. NetFlow is the ideal technology for usage-based billing because it allows...</p>
<p>The post <a href="https://cysight.ai/netflow-for-usage-based-billing-and-peering-analysis/">NetFlow for Usage-Based Billing and Peering Analysis</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p><strong>Usage</strong>&#8211;<strong>based billing </strong>refers to the methods of calculating and passing back the costs of running a network to the consumers of data that occur through the network. Both Internet Service Providers (ISP) and Corporations have a need for Usage-based billing with different billing models.</p>
<p>NetFlow is the ideal technology for usage-based billing because it allows for the capture of all transactional information pertaining to the usage and some <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor">smart NetFlow technologies</a> already exist to assist in the counting, allocation, and substantiation of data usage.</p>
<p>Advances in telecommunication technology have enabled ISPs to offer more convenient, streamlined billing options to customers based on bandwidth usage.</p>
<p>One billing model used most commonly by ISPs in the USA is known as the 95<sup>th</sup> percentile. The ISP filters the samples and disregards the highest 5% in order to establish the bill amount. This is an advantage to data consumers who have bursts of traffic because they’re not financially penalized for exceeding a traffic threshold for brief periods of time. The solution measures traffic employing a five-minute granularity standard typically over the course of a month.</p>
<p>The disadvantage of the 95<sup>th</sup> percentile model is that its not sustainable business model as data continues to become a utility like electricity.</p>
<p>A second approach is a utility-based metered billing model that involves retaining a tally of all bytes consumed by a customer with some knowledge of data path to allow for premium or free traffic plans.</p>
<p>Metered Internet usage is used in countries like Australia and most recently Canada who have nationally moved away from a 95<sup>th</sup> percentile model. This approach is also very popular in corporations whose business units share common network infrastructure and who are unwilling to accept “per user” cost, but rather a real consumption-based cost.</p>
<p>Benefits of usage-based billing are:</p>
<ul>
<li>Improved transparency about the cost of services;</li>
<li>Costs feedback to the originator;</li>
<li>Raised cost sensitivity;</li>
<li>Good basis for active cost management;</li>
<li>The basis for Internal and external benchmarking;</li>
<li>Clear substantiation to increase bandwidth costs;</li>
<li>Shared infrastructure costs can also be based on consumption;</li>
<li>Network performance improvements.</li>
</ul>
<p>For corporations, usage-based billing enables the IT department to become a shared service and viewed as a profit center rather than a cost center. It can become viewed as something that&#8217;s a benefit and a catalyst for business growth rather than a necessary but expensive line item in the budget.</p>
<p>For ISPs in the USA, there is no doubt that utility-based costs per byte model will continually be contentious as video and TV over Internet usage increases. In other regions, new business models that include packaging of video over “free zones” services have become popular meaning that the cost of premium content provision has fallen onto the content provider making utility billing viable in the USA.</p>
<p><a href="https://cysight.ai/free-trial">NetFlow tools</a> can include methods for building billing reports and offer a variety of usage-based billing model calculations.</p>
<p>Some NetFlow tools even include an API to allow the chart-of-accounts to be retained and driven from traditional accounting systems using the NetFlow system to focus on the tallying. Grouping algorithms should be flexible within the solution to allow for grouping of all different variables such as interfaces, applications, Quality of Service (QoS), MAC Addresses, MPLS, and IP groups. For ISPs and large corporations Asynchronous Network Numbers (ASN) also allow for analysis of data-paths allowing sensible negotiations with Peering partners and Content partners.</p>
<p>Look out for more discussion on peering in an upcoming blog&#8230;</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img loading="lazy" decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/netflow-for-usage-based-billing-and-peering-analysis/">NetFlow for Usage-Based Billing and Peering Analysis</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to counter-punch botnets, viruses, ToR &#038; more with Netflow [Pt 1]</title>
		<link>https://cysight.ai/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 25 Jul 2024 07:30:39 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[ToR]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=66</guid>

					<description><![CDATA[<p>You can&#8217;t secure what you can&#8217;t see and you don’t know what you don’t know. Many network and security professionals assume that they can simply analyze data captured using their standard security devices like firewalls and intrusion detection systems, however they quickly discover their limitations as these devices are not designed for and cannot record...</p>
<p>The post <a href="https://cysight.ai/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1/">How to counter-punch botnets, viruses, ToR &#038; more with Netflow [Pt 1]</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<h2><strong>You can&#8217;t secure what you can&#8217;t see and you don’t know what you don’t know.</strong></h2>
<p>Many network and security professionals assume that they can simply analyze data captured using their standard security devices like firewalls and intrusion detection systems, however they quickly discover their limitations as these devices are not designed for and cannot record and report on every transaction due to lack of granularity, scalability and historic data retention. Network devices like routers, switches, Wi-Fi or VMware servers also typically lack any sophisticated anti-virus software.</p>
<p>Presenting information in a manner that quickly enables security teams to act with simple views with deep contextual data supporting the summaries is the mark of a well constructed traffic analyzer ensuring teams are not bogged down by the detail unless required and even then allowing elegant means to extract forensics with simple but powerful visuals to enable quick contextual grasp and impact of a security event.</p>
<p><strong>Using NetFlow Correlation to Detect intrusions  </strong></p>
<p>Host Reputation is one of the best detection methods that can be used against Advanced Persistent Threats. There are many data sources to choose from and some are more comprehensive than others.</p>
<p>Today these blacklists are mostly IPv4 and Domain orientated designed to be used primarily by firewalls, network intrusion systems and antivirus software.</p>
<p>They can also be used in <a href="https://cysight.ai/seven-reasons-to-analyze-network-traffic-with-netflow">NetFlow systems</a> very successfully as long as the selected flow technology can scale to support the thousands of known compromised end-points, the ability to frequently update the threat data and the ability to record the full detail of every compromised flow and subsequent conversations that communicate with the compromised systems to discover other related breaches that may have occurred or are occurring.</p>
<p><img loading="lazy" decoding="async" class="wp-image-69 aligncenter" src="https://cysight.ai/wp-content/uploads/2017/09/matrix_of_knowledge-2-300x285.png" alt="" width="536" height="509" /></p>
<p>According to Mike Schiffman at Cisco,</p>
<blockquote>
<p>“If a given IP address is known to be that of a spammer or a part of a botnet army it can be flagged in one of the ill repute databases … Since these databases are all keyed on IP address, NetFlow data can be correlated against them and subsequent malicious traffic patterns can be observed, blocked, or flagged for further action. This is NetFlow Correlation.“</p>
</blockquote>
<p>The kind of data can we expect to find in the reputation databases are IP addresses that have known to be acting in some malicious or negative manner such as being seen by multiple global honeypots. Some have been identified to be part of a well-known botnet such as Palevo or Zeus whilst other IP’s are known to have been distributing Malware or Trojans. Many kinds of lists can be useful to correlate such as known ToR end points or Relays that have become particularly risky of late being a common means to introduce RansomWare and should certainly not be seen conversing to any host within a corporate, government or other sensitive environment.</p>
<p>Using a tool like CySight’s advanced End-Point Threat Detection allows NetFlow data to be correlated against hundreds of thousands of IP addresses of questionable reputation including ToR exits and relays in real-time with comprehensive historical forensics that can be deployed in a massively parallel architecture.</p>
<p>As a trusted source of deep network insights built on big data analysis capabilities, Netflow provides NOCs with an end-to-end security and performance monitoring and management solution. For more information on Netflow as a performance and security solution for large-scale environments, <a href="https://cysight.ai/8-keys-to-understanding-netflow">download our free Guide to Understanding Netflow.</a></p>
<p>Cutting-edge and innovative technologies like CySight delivers the deep end-to-end network visibility and security context required assisting in speedily impeding harmful attacks.</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img loading="lazy" decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/how-to-counter-punch-botnets-viruses-tor-more-with-netflow-pt-1/">How to counter-punch botnets, viruses, ToR &#038; more with Netflow [Pt 1]</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Improve Cyber Security with Advanced Netflow Network Forensics</title>
		<link>https://cysight.ai/how-to-improve-cyber-security-with-advanced-netflow-network-forensics/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Sun, 07 Jul 2024 07:30:06 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Retention Compliance]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=89</guid>

					<description><![CDATA[<p>Most organizations today deploy network security tools that are built to perform limited prevention &#8211; traditionally “blocking and tackling” at the edge of a network using a firewall or by installing security software on every system. This is only one third of a security solution, and has become the least effective measure. The growing complexity...</p>
<p>The post <a href="https://cysight.ai/how-to-improve-cyber-security-with-advanced-netflow-network-forensics/">How to Improve Cyber Security with Advanced Netflow Network Forensics</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="section post-body">
<p>Most organizations today deploy network security tools that are built to perform limited prevention &#8211; traditionally “blocking and tackling” at the edge of a network using a firewall or by installing security software on every system.</p>
<p>This is only one third of a security solution, and has become the least effective measure.</p>
<p>The growing complexity of the IT infrastructure is the major challenge faced by existing network security tools. The major forces impacting current network security tools are the rising level of sophistication of cybercrimes, growing compliance and regulatory mandates, expanding virtualization of servers and the constant need for visibility compounded by ever-increasing data volumes. Larger networks involve enormous amounts of data, into which the incident teams must have a high degree of visibility for analysis and reporting purposes.</p>
<p>An organization’s network and security teams are faced with increasing complexities, including network convergence, increased data and flow volumes, intensifying security threats, government compliance issues, rising costs and network performance demands.</p>
<p>With network visibility and traceability also top priorities, companies must look to security network forensics to gain insight and uncover issues. The speed with which an organization can identify, diagnose, analyze, and respond to an incident will limit the damage and lower the cost of recovery.</p>
<p>Analysts are better positioned to mitigate risk to the network and its data through security focused network forensics applied at the granular level. Only with sufficient granularity and historic visibility and tools that are able to machine learn from the network Big Data can the risk of an anomaly be properly diagnosed and mitigated.</p>
<p>Doing so helps staff identify breaches that occur in real-time, as well as Insider threats and data leaks that take place over a prolonged period. Insider threats are one of the most difficult to detect and are missed by most security tools.</p>
<p>Many network and security professionals assume that they can simply analyze data captured using their standard security devices like firewalls and intrusion detection systems, however they quickly discover limitations as these devices are not designed for and cannot record and report on every transaction due to lack of deep visibility, scalability and historic data retention making old fashioned network forensic reporting expensive and impractical.</p>
<p>NetFlow is an analytics software technology that enables IT departments to accurately audit network data and host-level activity. It enhances network security and performance making it easy to identify suspicious user behaviors to protect your entire infrastructure.</p>
<p>A <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor">well-designed NetFlow forensic tool</a> should include powerful features that can allow for:</p>
<ul>
<li>Micro-level data recording to assist in identification of real-time breaches and data leaks;</li>
<li>Event notifications and alerts for network administrators when irregular traffic movements are detected;</li>
<li>Tools that highlight trends and baselines, so IT staff can provision services accordingly;</li>
<li>Tools that learn normal behavior, so Network Security staff can quickly detect and mitigate threats;</li>
<li>Capture highly granular traffic over time to enable deep visibility across the entire network infrastructure;</li>
<li>24-7 automation, flexible reporting processes to deliver usable business intelligence and security forensics specifically for those analytics that can take a long time to produce.</li>
</ul>
<p>Forensic analysts require both high-level and detailed visibility through aggregating, division and drilldown algorithms such as:</p>
<ul>
<li>Deviation / Outlier analysis</li>
<li>Bi-directional analysis</li>
<li>Cross section analysis</li>
<li>Top X/Y analysis</li>
<li>Dissemination analysis</li>
<li>Custom Group analysis</li>
<li>Baselining analysis</li>
<li>Percentile analysis</li>
<li>QoS analysis</li>
<li>Packet Size analysis</li>
<li>Count analysis</li>
<li>Latency and RTT analysis</li>
</ul>
<p>Further when integrated with a visual analytics process it will enable additional insights to the forensic professional when analyzing subsets of the flow data surrounding an event.</p>
<p>In some ways it needs to act as a log analyzer, security information and event management (SIEM) and a network behavior anomaly and threat detector all rolled into one.</p>
<p>The ultimate goal is to deploy a multi-faceted flow-analytics solution that can compliment your business by providing extreme visibility and eliminating network blindspots, both in your physical infrastructure and in the cloud, automatically detecting and diagnosing your entire network for anomalous traffic and improving your mean time to detect and repair.</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img loading="lazy" decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/how-to-improve-cyber-security-with-advanced-netflow-network-forensics/">How to Improve Cyber Security with Advanced Netflow Network Forensics</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Perks of Network Performance Management</title>
		<link>https://cysight.ai/5-perks-of-network-performance-management/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Thu, 04 Jul 2024 12:59:03 +0000</pubDate>
				<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=21</guid>

					<description><![CDATA[<p>Network performance management is something that virtually every business needs, but not something that every business is actively doing, or even aware of.  And why should they? While understanding the technical side of things is best left to the IT department, understanding the benefits of a properly managed network is something that will help get the...</p>
<p>The post <a href="https://cysight.ai/5-perks-of-network-performance-management/">5 Perks of Network Performance Management</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://cysight.ai/" target="_blank" rel="noopener noreferrer">Network performance management</a> is something that virtually every business needs, but not something that every business is actively doing, or even aware of.  And why should they?</p>
<p>While understanding the technical side of things is best left to the IT department, <a href="https://cysight.ai/benefits-of-network-security-forensics/">understanding the benefits</a> of a properly managed network is something that will help get the business managers on board, especially when good performance management solutions might be a cost that hadn&#8217;t been considered.  So what are the benefits?</p>
<p>1.  <strong>Avoiding downtime</strong> &#8211; Downtime across an entire network is going to be rare, but downtime in small areas of the network are possible if it gets overloaded.  Downtime of any kind is just not something that business can tolerate, for a few reasons:</p>
<ul>
<li>it leaves that area of the network unmonitored, which is a serious security issue</li>
<li>shared files won&#8217;t be accessible, nor will they be updating as users save the files.  This will lead to multiple versions of the same file, and quite a few headaches when the network is accessible again</li>
<li>downtime that affects customers is even worse, and can result in lost revenue or negative customer experiences</li>
</ul>
<p>2.  <strong>Network speed</strong> &#8211; This is one of the most important and easily quantified aspects of managing netflow.  It will affect every user on the network constantly, and anything that slows down users means either more work hours or delays.  Obviously, neither of these is a good problem to have.  Whether it&#8217;s uploading a file, sending a file to a coworker, or sending a file to a client; speed is of paramount importance.</p>
<p>3.  <strong>Scalability</strong> &#8211; Almost every business wants to grow, and nowhere is that more true than the tech sector.  As the business grows, the network will have to grow with it to support more employees and clients.  By managing the performance of the network, it is very easy to see when or where it is being stretched too thin or overwhelmed.  As performance degrades, it&#8217;s very easy to set thresholds that show when the network need upgraded or enlarged.</p>
<p>4.  <strong>Security</strong> &#8211; Arguably the most important aspect of network management, even though it might not be thought of as a performance aspect.  An unsecured network is worse than a useless network, and data breaches can ruin a company.  So how does this play into performance management?</p>
<p>By monitoring netflow performance, it&#8217;s easy to see where the most resources are being used.  Many security attacks drain resources, so if there are resource spikes in unusual areas it can point to a security flaw.  With proper software, these issues can be not only monitored, but also recorded and corrected.</p>
<p>5.  <strong>Usability</strong> &#8211; Unfortunately, not all employees have a working knowledge of how networks operate.  In fact, as many in IT support will attest, most employees aren&#8217;t tech savvy.  However, most employees will need to use the network as part of their daily work.  This conflict is why usability is so important.  The easiest way to minimize training costs with any network management program is to ensure that it is as user-friendly as possible.</p>
<p>The fanciest, most impressive network performance management system isn&#8217;t worth anything if no one knows how to use and optimize it properly.  Even if the IT department has no issues with it, the reports and general information should be as easy to decipher as possible.</p>
<p>Is your network as optimized as it could be?  Are you able to monitor the network&#8217;s performance and flow,  or do network forensics to determine where issues are?  Don&#8217;t try to tackle all of this on your own, <a href="https://cysight.ai/contact.php" target="_blank" rel="noopener noreferrer">contact us</a> and let us help you support your business with the best network monitoring for your specific needs.</p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a id="cta_button_559421_3cd2b926-b3e8-470c-baed-f910a4530759" class="cta_button" href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img loading="lazy" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
<p>The post <a href="https://cysight.ai/5-perks-of-network-performance-management/">5 Perks of Network Performance Management</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
