Blog

The GTRI blog provides insightful, useful and impactful information on a variety of technology topics written by our first-class engineers and technical experts. Stop back often to read about the latest tech trends and insights.

  • SANS Security 504: Hacker Techniques, Exploits & Incident Handling

    Dave Herrald   |   September 5, 2013
    I'm honored to announce that I will again be working with the SANS Institute to mentor SANS Security 504 Hacker Techniques, Exploits, & Incident Handling in Denver starting in January 2014.  Details and registration information are... Read more
  • Splunk and Cloudmeter Stream

    Micah Montgomery   |   June 18, 2013
    Data is big, we have become aware of the scale that data is reaching.  Data storage is no longer a troublesome issue but data management has become increasingly important.  Splunk can pull the important data straight out of the modge podge... Read more
  • Cisco Web Security – ScanSafe and IronPort

    Dave Herrald   |   June 18, 2013
    SECURE MARKET GATEWAY Market Definition/Description A secure Web gateway (SWG) is a solution that filters unwanted and malicious software (malware) from user-initiated Web/Internet traffic, and enforces corporate Internet policy... Read more
  • When you only have two colors, all your pictures are black and white

    Craig Jeske   |   May 1, 2013
    I had a meeting several weeks ago with a large customer who is moving towards a centralized virtual data center concept.  They currently have well over 100 data centers and are looking to consolidate down to under 25 data centers.  Given... Read more
  • Splunk with Hadoop: Three Ways to Play

    Dave Herrald   |   March 30, 2013
    With Splunk's recent announcement of Hunk (Hadoop and Splunk), lots of customers are wondering exactly how these two leading big data platforms can work together.  From a Splunk perspective, there are actually three ways to integrate with... Read more
  • Using Dual Protocol for SIEMs Evasion

    Scott Hogg   |   March 24, 2013
    Attackers using IPv4 and IPv6 can avoid detection by IPS, SIEMs, reputation filtering, and more It is just a fact of life that attackers and defenders are now operating in a dual-protocol world. With the addition of IPv6, attackers are... Read more
  • Five Cyber Security Tips for Computer and Online Safety

    Dave Herrald   |   March 23, 2013
    It's October and that means National Cyber Security Awareness Month is upon us. What better time for some quick tips to make yourself more secure online? I decided to pull together the top five recommendations I often find myself giving to... Read more
  • Splunk Boot Camps

    Micah Montgomery   |   March 18, 2013
    Here at GTRI and we have had the pleasure of hosting multiple Splunk Boot Camps, informative sessions that help anyone interested in how to work with Splunk software to manage their data.  Multiple Splunk Boot Camps happen here at GTRI and... Read more
  • Cisco AnyConnect and ASA

    Dave Herrald   |   March 18, 2013
    Easily Manage Borderless Security The Cisco AnyConnect Secure Mobility Solution provides a comprehensive, highly secure enterprise mobility solution. It combines industry-leading Cisco web security with next-generation remote access... Read more
  • Security Assessments (Part 1)

    Dave Herrald   |   March 12, 2013
    I'm very excited to contribute my first series of posts to the new GTRI Technology Blog! Recently, I have spent some time talking with GTRI customers about how to assess the information security posture of their organizations. While... Read more