<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Advanced Netflow Archives &#8211; CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</title>
	<atom:link href="https://cysight.ai/tag/advanced-netflow/feed/" rel="self" type="application/rss+xml" />
	<link>https://cysight.ai/tag/advanced-netflow/</link>
	<description>AI-Driven Cybersecurity for NetFlow, IPFIX and sFlow, with Encrypted Traffic Analysis, Baselining and Security Observability</description>
	<lastBuildDate>Thu, 19 Sep 2024 12:28:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</title>
		<link>https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 07:07:14 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Monitoring]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Network Usage Billing]]></category>
		<category><![CDATA[Peering Analytics]]></category>
		<category><![CDATA[Performance Analytics]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Traffic Accounting]]></category>
		<category><![CDATA[Advanced Netflow]]></category>
		<category><![CDATA[Flexible]]></category>
		<category><![CDATA[Granular]]></category>
		<category><![CDATA[Scalable Netflow]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=10</guid>

					<description><![CDATA[<p>Why is flows per second a flawed way to measure a netflow collector&#8217;s capability? Flows-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer’s flow capture (aka collection) rate. This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right?...</p>
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="Default"><strong><span lang="EN-US"> Why is flows per second a flawed way to measure a netflow collector&#8217;s capability?</span></strong></h3>
<p class="Default">Flows<span lang="EN-US">-per-second is often considered the primary yardstick to measure the capability of a netflow analyzer</span><span lang="EN-US">’</span><span lang="EN-US">s flow capture (aka collection) rate.</span></p>
<p class="Default"><span lang="EN-US">This seems simple on its face. The more flows-per-second that a flow collector can consume, the more visibility it provides, right? Well, yes and no.</span></p>
<p class="Default"><strong><span lang="EN-US">The Basics<br />
</span></strong></p>
<p class="Default"><span lang="EN-US">NetFlow was originally conceived as a means to provide network professionals the data to make sense of the traffic on their network without having to resort to expensive per segment based packet sniffing tools.</span></p>
<p class="Default"><span lang="EN-US">A flow record contains at minimum the basic information pertaining to a transfer of data through a router, switch, firewall, packet tap or other network gateway. A typical flow record will contain at minimum: Source IP, Destination IP, Source Port, Destination Port, Protocol, Tos, Ingress Interface and Egress Interface. Flow records are exported to a flow collector where they are ingested and information orientated to the engineer</span><span lang="EN-US">’</span><span lang="EN-US">s purposes are displayed.</span></p>
<p class="Default"><strong><span lang="EN-US">Measurement</span></strong></p>
<p class="Default"><span lang="EN-US">Measurement has always been how the </span>IT industry express<span lang="EN-US">es</span> <span lang="EN-US">power and competency. However, a formula used to reflect power and ability changes when a technology design undergoes a paradigm shift.</span></p>
<p class="Default"><span lang="EN-US">For example, when expressing how fast a computer is we used to measure the CPU clock speed. We believed that the higher the clock speed the more powerful the computer. However, when </span><span lang="IT">multi-core chips</span><span lang="EN-US"> were introduced the CPU power and </span><span lang="NL">speed </span><span lang="EN-US">dropped but the CPU in fact became more powerful. The primary clock speed measurement indicator became secondary to the ability to multi-thread.</span></p>
<p class="Default"><span lang="EN-US">The f</span>lows<span lang="EN-US">-per-second yardstick is misleading as it incorrectly reflects the actual power and capability of a flow collector to capture and process flow data and it has become prone to marketing exaggeration.</span></p>
<p class="Default"><strong><span lang="EN-US">Flow Capture Rate</span></strong></p>
<p class="Default"><span lang="EN-US">Flow capture rate ability is difficult to measure and to quantify a products scalability. There are various factors that can dramatically impact the ability to collect flows and to retain</span> <span lang="EN-US">sufficient </span>flows<span lang="EN-US"> to perform higher-end diagnostics.</span></p>
<p class="Default"><span lang="EN-US">I</span>t<span lang="FR">’</span><span lang="EN-US">s important to look not just at flows-per-second but at the granularity retained per minute (flow retention rate), the speed and flexibility of alerting, reporting, forensic depth and diagnostics and the scalability when impacted by high-flow-variance, sudden-bursts, number of devices and interfaces, the speed of reporting over time, the ability to retain short-term and historical collections and the confluence of these factors as it pertains to scalability of the software as a whole.</span></p>
<p class="Default"><span lang="EN-US">Scalable NetFlow and flow retention rates are particularly critical to determine as appropriate granularity is needed to deliver the visibility required to perform A</span>nomaly <span lang="EN-US">Detection, Network Forensics, Root Cause Analysis, Billing substantiation, Peering Analysis and Data retention compliance.</span></p>
<p class="Default"><strong><span lang="EN-US">The higher the flows-per-second and the flow-variance the more challenging it becomes to achieve a high flow-retention-rate to archive and retain flow records in a data warehouse</span>.</strong></p>
<p class="Default">A vendor<span lang="EN-US">’</span><span lang="EN-US">s capability statement might reflect a high flows-per-second consumption ability but many</span> <span lang="EN-US">flow software </span><span lang="NL">tools </span><span lang="EN-US">have retention rate limitations by design.</span></p>
<p class="Default"><span lang="EN-US">It can mean that irrespective of achieving a high flow collection rate the netflow analyzer might only be capable of physically archiving</span> <span lang="EN-US">5</span>00 flows<span lang="EN-US"> per minute. Furthermore, these flows are usually the result of sorting the flow data by top </span>byte<span lang="EN-US">s to identify </span><span lang="EN-US">“</span><span lang="EN-US">Top 10</span><span lang="EN-US">” </span><span lang="EN-US">bandwidth abusers. Netflow products of this kind can be easily identified because they often tend to offer benefits orientated primarily to identifying bandwidth abuse or network performance monitoring.</span></p>
<p class="Default"><span lang="EN-US">Identifying bandwidth abusers is of course a very important benefit of a netflow analyzer. However, it has a marginal benefit today where a large amount of the abuse and risk is caused by many small flows.</span></p>
<p class="Default"><span lang="EN-US">These small flows usually fall beneath the radar screen of many netflow analysis products.</span>  <span lang="EN-US">Many abuses like DDoS, </span>p2p<span lang="EN-US">, botnets</span> <span lang="EN-US">and hacker or insider data exfiltration continue to occur and can at minimum impact the networking equipment and user experience. Lack of ability to quantify and understand small flows creates great risk leaving organizations exposed.</span></p>
<p class="Default"><strong><span lang="EN-US">Scalability</span></strong></p>
<p class="Default"><span lang="EN-US">This inability to scale in short-term</span> <span lang="EN-US">or historical analysis severely impacts a flow monitoring product</span><span lang="EN-US">’</span><span lang="EN-US">s ability to collect and retain critical information required in today</span><span lang="EN-US">’</span><span lang="EN-US">s world where copious data has created severe network blind spots</span>.</p>
<p class="Default"><span lang="IT">To qualify </span><span lang="EN-US">if a tool is really suitable for the purpose, you need to know more about the flows-per-second collection formula being provided by the vendor and <a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">some deeper investigation</a></span> <span lang="EN-US"><a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">should be carried out to qualify the claims</a>.</span></p>
<p class="Default"><strong><span lang="EN-US"> </span></strong></p>
<p class="Default"><strong><span lang="EN-US">With this in mind here are 3 key questions to <a href="https://cysight.ai/index.php/go/talk-to-netflow-experts/?lp-variation-id=0">ask your </a></span><span lang="EN-US"><a href="https://cysight.ai/go/talk-to-netflow-experts/?lp-variation-id=0">NetFlow</a> vendor to understand what their collection scalability claims really mean:</span></strong></p>
<ol>
<li class="Default"><strong><span lang="EN-US">How many </span>flow<span lang="EN-US">s</span> </strong><span lang="EN-US"><strong>can be collected per second?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ol>
<ul>
<li class="Default">Qualify if the flows per second rate provided is a burst rate or a sustained rate.</li>
<li class="Default">Ask how the collection and retention rates might be affected if the flows have high-flow variance (e.g. a DDoS attack).</li>
<li class="Default">How is the collection, archiving and reporting impacted when flow variance is increased by adding many devices and interfaces and distinct IPv4/IPv6 conversations and test what degradation in speed can you expect after it has been recording for some time.</li>
<li class="Default">Ask how the collection and retention rates might change if adding additional fields or measurements to the flow template (e.g. MPLS, MAC Address, URL, Latency)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">How many </span></strong><span lang="EN-US"><strong>flow records can be retained per minute?</strong><br />
</span><span lang="EN-US"><br />
</span></li>
</ul>
<ul>
<li>Ask how the actual number of records inserted into the data warehouse per minute can be verified for short-term and historical collection.</li>
<li>Ask what happens to the flows that were not retained.</li>
<li>Ask what the flow retention logic is. (e.g. Top Bytes, First N)</li>
</ul>
<ul>
<li><strong><span lang="EN-US">What information granularity is retained for both short-term and historically</span>?</strong>
<ul>
<li><span lang="EN-US">Does the data</span><span lang="EN-US">’</span><span lang="EN-US"><span lang="EN-US">s time granularity degrade as the data ages e.g. 1 day data retained per minute, 2 days retained per hour 5 days retained per quarter</span></span></li>
<li>Can you control the granularity and if so for how long?</li>
</ul>
</li>
</ul>
<p><strong><span lang="EN-US"> </span></strong></p>
<p><strong><span lang="EN-US">Remember &#8211; Rate of collection does not translate to information retention.</span></strong></p>
<p><span lang="EN-US">Do you know what</span><span lang="EN-US">’</span><span lang="EN-US">s really stored in the software&#8217;s database? After all you can only analyze what has been retained (either in memory or on disk) and it is that information retention granularity that provides a flow products benefits.</span></p>
<p><span id="hs-cta-wrapper-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-wrapper"><span id="hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-node hs-cta-7d7caf6d-8b90-43d3-b208-1115e5777d8b" data-hs-drop="true"><a href="https://cysight.ai/go/8-keys-to-understanding-netflow/?lp-variation-id=0"><img fetchpriority="high" decoding="async" id="hs-cta-img-7d7caf6d-8b90-43d3-b208-1115e5777d8b" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/6a94b8cd-a518-4cf4-a1b8-d801cdb10d4b.png" alt="8 Keys to Understanding NetFlow for Network Security, Performance &amp; Overall IT Health" width="650" height="310" /></a></span></span></p>
<p class="Default">
<p>The post <a href="https://cysight.ai/scalable-netflow-3-key-questions-to-ask-your-netflow-vendor/">Scalable NetFlow &#8211; 3 Key Questions to Ask Your NetFlow Vendor</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Strategic Value of Advanced Netflow for Enterprise Network Security</title>
		<link>https://cysight.ai/the-strategic-value-of-advanced-netflow-for-enterprise-network-security/</link>
		
		<dc:creator><![CDATA[Rafi Sabel]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 08:34:30 +0000</pubDate>
				<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[NetFlow]]></category>
		<category><![CDATA[Network Forensics]]></category>
		<category><![CDATA[Network Intelligence]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Predictive AI Baselining]]></category>
		<category><![CDATA[Predictive Analytics]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Threat Detection]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Advanced Netflow]]></category>
		<guid isPermaLink="false">http://www.netflowauditor.com/?p=100</guid>

					<description><![CDATA[<p> Networks today are exponentially faster, bigger and more complex than those of just a few years ago. With thousands of devices going online for the first time each minute, and the data influx continuing unabated, it’s fair to say that we’re in the throes of an always-on culture. As the network becomes arguably the most...</p>
<p>The post <a href="https://cysight.ai/the-strategic-value-of-advanced-netflow-for-enterprise-network-security/">The Strategic Value of Advanced Netflow for Enterprise Network Security</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="hs-blog-social-share"> Networks today are exponentially faster, bigger and more complex than those of just a few years ago.</div>
<div class="section post-body">
<p>With thousands of devices going online for the first time each minute, and the data influx continuing unabated, it’s fair to say that we’re in the throes of an always-on culture.</p>
<p>As the network becomes arguably the most valuable asset of the 21st century business, IT departments will be looked at to provide not just operational functions, but, more importantly, strategic value.</p>
<p>Today’s network infrastructures contain hundreds of key business devices across a complex array of data centers, virtualized environments and services. This means Performance and Security Specialists are demanding far more visibility from their monitoring systems than they did only a few years ago.</p>
<p>The growing complexity of modern IT infrastructure is the major challenge faced by existing network monitoring (NMS) and security tools.</p>
<p>Expanding networks, dynamic enterprise boundaries, network virtualization, new applications and processes, growing compliance and regulatory mandates along with rising levels of sophistication in cyber-crime, malware and data breaches, are some of the major factors necessitating more granular and robust monitoring solutions.</p>
<p>Insight-based and data-driven monitoring systems must provide the deep visibility and early warning detection needed by Network Operations Centre (NOC) teams and Security professionals to manage networks today and to keep the organization safe.</p>
<p>For over two decades now, <a href="https://cysight.ai" target="_blank" rel="noopener noreferrer">NetFlow</a> has been a trusted technology which provides the data needed to enable the performance management of medium to large environments.</p>
<p>Over the years, NetFlow analysis technology has evolved alongside the networks it helps optimize to provide information-rich analyses, detailed reporting and data-driven network management insights to IT departments.</p>
<p>From traffic accounting, to performance management and security forensics, NetFlow brings together both high-level and detailed insights by aggregating network data and exporting it to a flow collector for analysis. Using a push-model makes NetFlow less resource-intensive than other proprietary solutions as it places very little demand on network devices for the collection and analysis of data.</p>
<p><a href="https://cysight.ai/5-benefits-of-netflow-performance-monitoring" target="_blank" rel="noopener noreferrer">NetFlow</a> gives NOCs the information they need for pervasive deep network visibility and flexible Predictive AI Baselining analytics, which substantially reduces management complexity. Performance and Security Specialists enjoy unmatched flexibility and scalability in their endeavors to keep systems safe, secure, reliable and performing at their peak.</p>
<p>Although the NetFlow protocol promises a great deal of detail that could be leveraged to the benefit of the NOC and Security teams, many NetFlow solutions to date have failed to provide the contextual depth and flexibility required to keep up with the evolving network and related systems. Many flow solutions simply cannot scale to archive the necessary amount of granular network traffic needed to gain the visibility required today. Due to the limited amount of usable data they can physically retain, these flow solutions are used for only basic performance traffic analysis or top talker detection and cannot physically scale to report on needed Predictive AI Baselining analytics making them only marginally more useful than an SNMP/RMON solution.</p>
<p>The newest generation of NetFlow tools must combine the granular capability of a real-time forensics engine with long-term capacity planning and data mining abilities.</p>
<p>Modern NetFlow applications should also be able to process the ever expanding vendor specific flexible NetFlow templates which can provide unique data points not found in any other technology.</p>
<p>Lastly, the system needs to offer machine-learning intelligent analysis which can detect and alert on security events happening in the network <i>before</i> the threat gets to the point that a human would notice what has happened.</p>
<p>When all of the above capabilities are available and put into production, a NetFlow system become an irreplaceable application in an IT department&#8217;s performance and security toolbox.</p>
<p><span id="hs-cta-wrapper-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-wrapper"><span id="hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-node hs-cta-527f1bbb-3315-415f-889e-38bb1dbcd6c7" data-hs-drop="true"><a href="https://cysight.ai/go/performance-monitoring-security-forensics/"><img decoding="async" id="hs-cta-img-527f1bbb-3315-415f-889e-38bb1dbcd6c7" class="hs-cta-img alignnone" src="https://cdn2.hubspot.net/hubfs/559421/hub_generated/resized/426f579e-a53f-4aea-81a9-02bc4e703a73.png" alt="Performance Monitoring &amp; Security Forensics: The 1-2 Punch for Network and IT Infrastructure Visibility" width="650" height="309" /></a></span></span></p>
</div>
<p>The post <a href="https://cysight.ai/the-strategic-value-of-advanced-netflow-for-enterprise-network-security/">The Strategic Value of Advanced Netflow for Enterprise Network Security</a> appeared first on <a href="https://cysight.ai">CySight - Integrated AI-Driven Cyber Network and EndPoint Detection and Response</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
