CloudShark Appliance

From the shark's mouth

Wednesday, Mar 18, 2015

CloudShark 2.5 - Geolocation, HTTP object forensics, Wireless decryption

Zach gives us an update here: Watch the video. Yes, it’s only been two months, but we had so many great ideas percolating (Yes, percolating. Like coffee.) that we couldn’t hold back any longer. Here’s the new and improved CloudShark 2.5. The endpoints tool A lot of people have asked us to have a tool that is a one-stop shop for the most active participants in a capture, which is useful for security analysis (among other things).

Read the whole entry »

Monday, Mar 9, 2015

Native Packet Capture in Windows 8

There was a time when saying something like “native packet capture in Windows” would get you laughed out of a karaoke bar full of IT geeks. We’ll let that sentence settle in for a second… then tell you that yes, indeed, Windows 8 includes native packet capture, and you can easily integrate it with CloudShark! This feature can be found using the netsh command. Included among a host of other network tools associated with the command is the trace argument, which can be used to begin and end an network trace.

Read the whole entry »

Monday, Feb 9, 2015

HIPAA, shadow IT, and the packet capture problem

Note: We here at CloudShark aren’t HIPAA experts, we just think its neat to talk about. Don’t take this as “official” advice. We’ve been harping lately on network security, which is one of the reasons we included secure delete as a new feature in CloudShark 2.4. This got us having some “water-cooler” (we don’t have a water cooler, it’s actually a shark tank) discussion around the security of packet captures in general, and naturally, how that applies to regulations like HIPAA, the “Health Insurance Privacy and Accountability Act”.

Read the whole entry »

Monday, Feb 9, 2015

Using CloudShark for Education

Are you an instructor on network security, or a computer science professor teaching computer networking? We’ve recently highlighted the ways CloudShark is being used now for all kinds of educational uses, and received a great new case study from certified SANS instruction Paul A. Henry from Vnet Security, LLC. Check it out!

Read the whole entry »

Monday, Jan 26, 2015

CloudShark 2.4 - Secure Delete, CentOS 7, and Monitoring

Zach gives us an update here: Watch the video. We’ve had our noses to the grindstone for quite some time, but we’re happy to announce that CloudShark 2.4 is here! While we continue to make some behind-the-scenes improvements, this release contains some features that were specifically requested by customers. Secure Delete For the particularly security conscious, we’ve added the secure delete feature to CloudShark 2.4. This is available in the administrators settings, and allows you the option of permanently deleting captures from the disk (a concept also known as “shredding”).

Read the whole entry »


Popular Tags

Older Entries

About CloudShark Appliance

CloudShark Appliance is made by QA Cafe, a technology company based in Portsmouth, NH. Our passion for packet captures has grown out of our other product CDRouter.

Get in touch via our Contact us page or by following us on your favorite service: