Request Trial 

Efficient Anomaly Mitigation With BGP FlowSpec

[fa icon="calendar'] May 3, 2018 11:53:01 AM / by Giorgos Dimopoulos posted in Cyber-Security

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

Web Tracking: Key Mechanisms and How You Can Defend Against Them

[fa icon="calendar'] Jan 24, 2018 4:35:45 PM / by Valentín Carela posted in Cyber-Security

[fa icon="comment"] 0 Comments

Organizations are constantly collecting our data as we browse the internet. In some cases, users consent to giving over this information, like when they choose to fill in an online form. In other cases, this occurs without the user’s agreement. The large scale collection and analysis of personal information in fact makes up the core business of many companies, including service providers, content providers and other third parties, who each use it for commercial purposes.

Read More [fa icon="long-arrow-right"]

Advanced Application Identification with Talaia's Engine

[fa icon="calendar'] Jan 11, 2018 2:33:03 PM / by Valentín Carela posted in Cyber-Security

[fa icon="comment"] 0 Comments


Read More [fa icon="long-arrow-right"]

BGP Peering Analytics For Network Traffic Flow Optimization

[fa icon="calendar'] Dec 12, 2017 2:41:34 PM / by Valentín Carela posted in Cyber-Security

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

Meet Talaia’s Latest Automatic DDoS Protection Technology At SC17 In Denver

[fa icon="calendar'] Nov 10, 2017 12:08:26 PM / by Valentín Carela posted in Events, Cyber-Security, News

[fa icon="comment"] 0 Comments

Read More [fa icon="long-arrow-right"]

SHIELD: How Talaia Is Working With HPE & Telefónica On Cybersecurity Through NFV

[fa icon="calendar'] Nov 3, 2017 6:56:11 PM / by Valentín Carela posted in Cyber-Security

[fa icon="comment"] 0 Comments

Cybercrime is a major risk to countries all over the world, including those situated in the European Union. It is a major threat to the security of citizens, privacy, democracy and the economy. By 2021, cybercrime is expected to cost the world around $1 trillion per year. Already this year, ransomware attacks alone cost us $5 billion, a massive increase compared to the $325 million figure of two years ago. This is supported by a recent study of 237 companies in six countries by Ponemon Institute which revealed the severe reputational and financial consequences of cybercrime. In particular companies lose $9M, on average, each year due to cybercrime. Against the backdrop of this rapid growth in costly cyberattacks, IBM’s CEO Ginni Rometty states: “cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world.” To counter this ever evolving digital threat, collective efforts are necessary to bring together industry leaders and develop innovative solutions. That’s exactly why the SHIELD project was launched.

Read More [fa icon="long-arrow-right"]

Why Network Visibility Is The Key To A Secure Cloud Environment

[fa icon="calendar'] Oct 10, 2017 12:33:07 PM / by Valentín Carela posted in Cyber-Security

[fa icon="comment"] 0 Comments

Let’s talk trends. As of this very moment, 93% of all US & EMEA organizations are using at least one cloud-based technology. Public cloud revenue is expected to grow from $146 billion (2017) to $236 billion by 2020 as companies increasingly transition from a cloud-first to a cloud-only strategy . In fact, the new industry standard is the use of multiple clouds and most enterprises are already opting for a hybrid cloud environment . Moreover, between 67% and 75% of companies are estimated to be using a hybrid cloud structure. These numbers are growing rapidly as businesses look to leverage the benefits of both, the more stable private cloud as well as the more flexible and scalable public cloud. However, as the majority of global companies move to the cloud, the question of security still remains.

Cloud advantages

Whether it’s AWS, Azure or Google Cloud, the cost of having your services in the cloud is reducing, and the ability to save IT expenditure is probably the main driver behind the global trend to shift more and more services and data into the cloud. IT budgets receive another boost through cloud technology usage as its costs typically fall under operating expenditure (OPEX) instead of capital expenditure which allows for more financial flexibility.  As a result, cloud technology allows companies with less resources to get access to the best technology previously only available to big enterprises.

Read More [fa icon="long-arrow-right"]

NetFlow 101

[fa icon="calendar'] Apr 18, 2017 11:17:20 AM / by The Team @Talaia posted in Whitepapers

[fa icon="comment"] 0 Comments

Talaia’s monitoring algorithms are based on the de facto industry standard protocol known as NetFlow.

 In this whitepaper we will clarify what NetFlow is, explain its intrinsic characteristics, and why it is the best possible approach to monitoring network data, specially on high-speed links.

Read More [fa icon="long-arrow-right"]

Thoughts on the Recently Announced Vulnerabilities in Cisco NetFlow Appliances

[fa icon="calendar'] Mar 9, 2017 10:51:17 AM / by Josep Sanjuas posted in News

[fa icon="comment"] 0 Comments

A couple of days ago Cisco announced a vulnerability in some of their NetFlow appliances. The vulnerability itself was not especially grave: an error in processing certain SCTP packets could be abused to remotely hang or reboot the appliance. The SCTP protocol is not widely used, and that is, most likely, one of the reasons why such a vulnerability stayed undetected for a long time.

Read More [fa icon="long-arrow-right"]

Understanding Australian Metadata Retention

[fa icon="calendar'] Feb 20, 2017 11:52:05 AM / by The Team @Talaia posted in Cyber-Security, Whitepapers

[fa icon="comment"] 0 Comments

Australia has passed laws that force Communication Service Providers (including ISPs) to perform metadata collection and retention for use for security purposes by a few government agencies.

Complying with such metadata retention laws is not an easy task from a technical standpoint. We have compiled a whitepaper reviewing the requirements imposed on service providers and how they can comply without too many headaches.

Read More [fa icon="long-arrow-right"]