Blog

CMMI SVC Level 3 Appraisal

SealingTech recently went through a CMMI Level 3 appraisal for Services. If you’ve never heard of CMMI, it stands for Capability Maturity Model Integration and Level 3 is one of five “Maturity Levels” in the CMMI model, known as the “Defined” level. Essentially, all of our company processes and procedures were reviewed for each of…

Read More...

Cloud Security (Part 1): Passive Security Monitoring in RackSpace

This is Part 1 of our “Cloud Security” series, with a goal of setting up a simple passive security monitoring capability in the cloud. Future posts will show how to enable out-of-band management, as well as setting up the monitoring services themselves. Enjoy!

Read More...

SANS 2018 Holiday Hack Challenge

Here at SealingTech we are proud to have a team of engineers who are constantly challenging themselves and each other at work and in their free time! You may recall several other challenges we have blogged about such as Kevin’s work on the IXIA Breaking Point Network Profiles challenge, or Scott and Tony’s solutions for the Cloudshark Halloween PCAP…

Read More...

Trick or Treat: Halloween PCAP Challenge from Cloudshark

TL;DR During Halloween, a company called Cloudshark released a Packet Capture challenge that involved finding hidden “pumpkins” that were hidden in packets. Two SealingTech employees, Tony Efantis and Scott Lohin, participated in the challenge and found all five pumpkins. This challenge was a lot of fun, and we thank Cloudshark for creating it for the…

Read More...

How to Script Large Ixia Breaking Point Network Profiles

Background My team at SealingTech was tasked with testing the performance of a router that would be a tunnel endpoint for many different Site to Site VPN connections from various places. We were given requirements that it needed to support thousands of tunnels and VRFs and lots of bandwidth (upwards of 20 Gb/s). We had…

Read More...

SR-IOV and Promiscuous Mode

For the past year, SealingTech’s Innovation Team has been working on an open source side-project called Expandable Defensive Cyber Operations Platform (EDCOP), with the goal of building a highly scalable containerized network security platform. I always tell people that if they want to try it on hardware, they need to get an Intel X710 or…

Read More...

Cisco Live! 2018 – Orlando, FL

I am fortunate to work for a company that truly believes in continuing education for all it’s employees (one of the many perks of working at SealingTech). Each employee gets a set amount to spend to further their education. While some choose the collegiate path, I have chosen the certification path where I have gone…

Read More...

Host Based Risk Scoring (Part 2): Calculating the Vulnerability Level of a System

This is Part 2 of the Host Based Risk Scoring series. If you haven’t checked out Part 1, check out the post at Host Based Risk Scoring (Part 1). Please note that information in these articles are taken from my personal ideas and experience. I’d love to hear your comments and thoughts on these concepts….

Read More...

Adventures in Suricata (Part 1): Low Cost Intrusion Detection System

Welcome to the Adventures in Suricata series! Over the past couple months I have been exploring Suricata, an open source Intrusion Detection System (IDS), by standing it up in my virtualized ESXi server at home. By sharing my own experiences with you, I hope to overcome the misconception that IDS is only viable for large…

Read More...