Contact Us

Month: February 2018

Recent memcached Attacks: What Kentik Sees

By Jim Meehan, Director of Product Marketing | Feb 28, 2018
Network Security

Attackers are using memcached to launch DDoS attacks. Multiple Kentik customers have reported experiencing the attack activity. It started over the weekend, with several external sources and mailing lists reporting increased spikes on Tuesday. In this blog post, we look at what our platform reveals about these attacks.

Read More

How Limelight Networks Automates Traffic Engineering and Reduces Infrastructure Cost and MTTR

By Michelle Kincaid | Feb 28, 2018
Case Study, Network Management, Performance Monitoring

Most web content and application providers today utilize Content Delivery Networks (CDNs) to ensure the best user experience. Therefore, CDN providers are constantly competing to deliver the fastest websites and software downloads, most responsive applications, highest-quality video, and lowest latency gaming. To thrive in the highly competitive CDN marketplace, operators must continuously optimize their globally […]

Read More

Digital Transformation Starts With Managing Digital Disruption

By Stephen Collins, Principal Analyst, ACG Research | Feb 27, 2018
Network Management

While defining digital transformation strategies is a valuable exercise for C-level executives, CIOs and IT managers also need to adopt a pragmatic and more tactical approach to “going digital.” That starts with acquiring tools and building the new skills needed to ensure business success and profitability in the face of digital disruption. In this post, ACG Principal Analyst Stephen Collins looks at how to manage it all.

Read More

The Future of DDoS Protection in an IoT World

By Ken Osowski, Independent Industry Consultant | Feb 22, 2018
DDoS Protection

IoT represents a massive threat to network infrastructure, as seen in widely publicized IoT-based DDoS attacks like Mirai. So what needs to happen to safeguard our devices and networks from participating in these botnet attacks? And how can IoT device originated attacks get quickly identified and stopped by network operators? In this post, we discuss scalable IoT DDoS protection.

Read More

What’s Driving Advanced Network Analytics Adoption? Instant ROI

By Michelle Kincaid | Feb 12, 2018
Network Management

A new EMA report on network analytics is full of interesting takeaways, from reasons for deployment to use cases after analytics are up and running. In this post, we look specifically at the findings around adoption to see why and how organizations are leveraging network analytics.

Read More

Seeing CDN Traffic with Kentik Detect

By Justin Ryburn, Technical Marketing Manager | Feb 8, 2018
Network Management

CDNs have been around for years, but they’ve gained new importance with the rise of video streaming services like Netflix and Hulu. As traffic from those sites soars, CDNs introduce new challenges for network operations teams at both service providers and enterprises. Kentik Detect’s new CDN Attribution makes identifying and tracking CDN traffic a whole lot easier. In this blog, we provide examples of how companies can implement this functionality.

Read More

What Do Poker and Networking Have in Common?

By Michelle Kincaid | Feb 7, 2018

If you’ve spent any amount of time with Kentik Co-founder and CEO Avi Freedman, you know he’s a networking nerd at heart. You may have also heard of his past (and sometimes current pastime) as a high-stakes poker player. Now, in merging two of Avi’s passions together, we’ve launched Kentik Poker!

Read More