As the majority of organizations refocus their network security efforts on the insider threat and detection of compromise, NetFlow becomes a rich and very important source of contextual information about the traffic, helping augment analysis in order to determine where compromise has occurred. This takes NetFlow out of the traditional realm of use for optimizing network and application performance and into the security arena as a critical requirement.
So if NetFlow is to be relied on as a required and continuous information source, the architecture to generate and analyze it has to be optimized for the use case. Review of the NetFlow generation framework needed for security and how to leverage it for various related uses cases is the focus of this paper.
Fill out the short form to download this whitepaper today.
oops! It appears you have an ad blocker enabled. To register, please disable your ad blocker.