6 Ways Network Flow Monitoring Adds Value to Your IT Stack

6 Ways Network Flow Monitoring Adds Value to Your IT Stack

6 Ways Network Flow Monitoring Adds Value to Your IT Stack   Network flow monitoring systems provide deep insight into the traffic running across your network, a window through which to visualize characteristics of users and applications as they perform their...

read more
Detecting Ransomware with Byte25

Detecting Ransomware with Byte25

At the risk of stating the obvious, most organisations are concerned about the possibility of falling victim to a Ransomware attack. In fact, a recent study has shown that upwards of 37% of small to medium sized businesses have already suffered a Ransomware attack...

read more
Using Playbooks To Enable Cyber Security Services for MSPs

Using Playbooks To Enable Cyber Security Services for MSPs

The Challenge of Building Cyber Security Services Cyber security is an increasingly important part of business. If you’re an MSP, your clients rely on you to maintain a secure environment, that is, clients largely outsource responsibility for cyber security to their...

read more
How to be a Better Vendor (or 6 Things MSPs Hate About Vendors)

How to be a Better Vendor (or 6 Things MSPs Hate About Vendors)

The relationship between MSPs and vendors seems strained. Vendors seem to consistently behave in a manner that annoys MSPs.  Now this may be a strange blog post from a vendor like Byte25, but here are the things that we hear from MSPs about vendors (like Byte25) … and...

read more
The Challenge of Developing Cyber Services for MSP’s

The Challenge of Developing Cyber Services for MSP’s

So you’re an MSP and you have a solid set of loyal SME customers that you have been providing excellent services to for years now. But at the back of your mind you sense a threat on the horizon, more and more of your customers are asking about  the security of...

read more
Measuring Network Performance – Latency or Jitter

Measuring Network Performance – Latency or Jitter

There are some age old conundrums that may never be solved, questions like dog or cat, Facebook or Instagram, burger or taco or most importantly of all, #whiteandgold or #blueandblack? And when it comes to measuring network performance, we often debate the concept of...

read more
Is Packet Capture Still Relevant in Modern Networks?

Is Packet Capture Still Relevant in Modern Networks?

A long time ago in a data centre far, far away, packet analysers (or packet capture tools) were the default ‘go-to’ tool for network diagnostics. Packet analyser vendors made good money before being usurped by the ubiquitous rise of freeware offerings like Wireshark....

read more
Why is my home network so slow?

Why is my home network so slow?

Given that many of us have been working from home now for some months since the arrival of COVID, I thought it might be timely to take a look at the performance of asymmetric network links which are typical of many domestic Internet connections (at least this is...

read more
Distributed Packet Capture Solutions

Distributed Packet Capture Solutions

… or the 3 major problems with packet capture in modern networks Packet capture and analysis is troubleshooting technique that has been around for many years now, and for sheer power and completeness there is arguably no better diagnostic technique to identify network...

read more
Are We Witnessing the Death of Network Performance Monitoring?

Are We Witnessing the Death of Network Performance Monitoring?

This might seem a strange subject for a blog post from a company like Byte25, whose main focus is in fact …. network performance monitoring, but it is an interesting question for consideration. I wouldn’t necessarily be calling the undertaker just yet, but there is no...

read more
Correlation, the Key to True Network Visibility

Correlation, the Key to True Network Visibility

Have you ever heard of the term ‘single pane of glass’ when IT people speak about monitoring tools … of course you have! It’s a oft used (and mis-used) term for a management console that presents data from multiple sources in a single display. I probably first heard...

read more
Mitigating against the Recent FireEye Breach

Mitigating against the Recent FireEye Breach

A quick discussion of the recent FireEye breach and how to implement the FireEye Tool countermeasures into Byte25 to keep your network safe. If you are working in cyber security, you are probably aware of the recent FireEye breach. On the off chance that it passed you...

read more
HTTP/3 is Coming – Look Busy

HTTP/3 is Coming – Look Busy

There is a new major version of HTTP on the horizon, HTTP Version 3. There is nothing you need to do, as HTTP/3 will sit quite happily alongside older versions 1 and 2 promising better performance. The major technical difference is that HTTP/3 does not use TCP as the...

read more
Will TLS 1.3 split the Internet?

Will TLS 1.3 split the Internet?

A new version of Transport Layer Security (TLS) is coming… welcome TLS1.3! Well to be fair it is already here and has been for over 12 months, but as is the case with many Internet standards, adoption is taking some time. And for those not fully across exactly what...

read more
The Irony of the Solarwinds Hack

The Irony of the Solarwinds Hack

I must confess, there was just the slightest sense of schadenfreude when I first heard of the Solarwinds hack. I mean, Solarwinds are a behemoth in the network performance monitoring space and a competitor to boot – so the idea that they had suffered a significant...

read more
A Review of the Garland Technology FieldTap

A Review of the Garland Technology FieldTap

There are some unique advantages in using a Garland FieldTap with a Byte25 appliance that were not immediately obvious until we connected it up and ran some tests. Turns out this is a perfect tap to use for monitoring. For information on the FieldTap from Garland...

read more