Identifying WiFi issues
Complete Network Observability See how Byte25 can identify WiFi issues across you entire network ... Supporting WiFi for work from home users continues to be one of the major challenges facing IT providers and MSPs. When remote workers connect to company...
Using Byte25 to Classify Microsoft Application Traffic
Byte25 Application Classification Identifying & Classifying Microsoft Traffic Microsoft applications, and in particular Office365, are pervasive across most enterprise environments. The ability to report on usage and performance of individual Microsoft...
Rediscover the Power of Network Based Intrusion Detection
Rediscover the Power of Network-Based Intrusion Detection A Superior Approach to Identifying Living-Off-The-Land Attacks like Volt Typhoon In the realm of cybersecurity, where threats continue to evolve and become more sophisticated, organisations must arm...
6 Ways Network Flow Monitoring Adds Value to Your IT Stack
6 Ways Network Flow Monitoring Adds Value to Your IT Stack Network flow monitoring systems provide deep insight into the traffic running across your network, a window through which to visualize characteristics of users and applications as they perform their...
Detecting Ransomware with Byte25
At the risk of stating the obvious, most organisations are concerned about the possibility of falling victim to a Ransomware attack. In fact, a recent study has shown that upwards of 37% of small to medium sized businesses have already suffered a Ransomware attack...
Using Playbooks To Enable Cyber Security Services for MSPs
The Challenge of Building Cyber Security Services Cyber security is an increasingly important part of business. If you’re an MSP, your clients rely on you to maintain a secure environment, that is, clients largely outsource responsibility for cyber security to their...
How to be a Better Vendor (or 6 Things MSPs Hate About Vendors)
The relationship between MSPs and vendors seems strained. Vendors seem to consistently behave in a manner that annoys MSPs. Now this may be a strange blog post from a vendor like Byte25, but here are the things that we hear from MSPs about vendors (like Byte25) … and...
The Challenge of Developing Cyber Services for MSP’s
So you’re an MSP and you have a solid set of loyal SME customers that you have been providing excellent services to for years now. But at the back of your mind you sense a threat on the horizon, more and more of your customers are asking about the security of...
Why Network Performance Monitoring is Critical for Cyber Security
A quick browse around the Internet shows that almost all traditional network monitoring vendors are now touting their expertise in cyber security. A large part of this of is course the relative size of the network performance monitoring and cyber security markets …...
If Only We Could Evaluate and Quantify Web Base Application Performance
Increasingly (or almost exclusively?) applications are delivered via web based single page applications or cloud based services. This is good thing right? I mean we can access fully interactive applications via a standard web browser, on a variety of platforms, be...
Measuring Network Performance – Latency or Jitter
There are some age old conundrums that may never be solved, questions like dog or cat, Facebook or Instagram, burger or taco or most importantly of all, #whiteandgold or #blueandblack? And when it comes to measuring network performance, we often debate the concept of...
Is Packet Capture Still Relevant in Modern Networks?
A long time ago in a data centre far, far away, packet analysers (or packet capture tools) were the default ‘go-to’ tool for network diagnostics. Packet analyser vendors made good money before being usurped by the ubiquitous rise of freeware offerings like Wireshark....
Why is my home network so slow?
Given that many of us have been working from home now for some months since the arrival of COVID, I thought it might be timely to take a look at the performance of asymmetric network links which are typical of many domestic Internet connections (at least this is...
Distributed Packet Capture Solutions
… or the 3 major problems with packet capture in modern networks Packet capture and analysis is troubleshooting technique that has been around for many years now, and for sheer power and completeness there is arguably no better diagnostic technique to identify network...
Are We Witnessing the Death of Network Performance Monitoring?
This might seem a strange subject for a blog post from a company like Byte25, whose main focus is in fact …. network performance monitoring, but it is an interesting question for consideration. I wouldn’t necessarily be calling the undertaker just yet, but there is no...
A Battle for the Ages, Packet Based v Flow Based Analysis Tools
Network performance monitoring tools use a wide range of techniques to collect data for analysis. Two if the most common techniques are packet based data collection and flow based packet collection. In this blog post, we will take a look at the pros and cons of each,...
Correlation, the Key to True Network Visibility
Have you ever heard of the term ‘single pane of glass’ when IT people speak about monitoring tools … of course you have! It’s a oft used (and mis-used) term for a management console that presents data from multiple sources in a single display. I probably first heard...
Mitigating against the Recent FireEye Breach
A quick discussion of the recent FireEye breach and how to implement the FireEye Tool countermeasures into Byte25 to keep your network safe. If you are working in cyber security, you are probably aware of the recent FireEye breach. On the off chance that it passed you...
HTTP/3 is Coming – Look Busy
There is a new major version of HTTP on the horizon, HTTP Version 3. There is nothing you need to do, as HTTP/3 will sit quite happily alongside older versions 1 and 2 promising better performance. The major technical difference is that HTTP/3 does not use TCP as the...
Will TLS 1.3 split the Internet?
A new version of Transport Layer Security (TLS) is coming… welcome TLS1.3! Well to be fair it is already here and has been for over 12 months, but as is the case with many Internet standards, adoption is taking some time. And for those not fully across exactly what...