scrutinizer logo

Forensic Investigation with Flow Data

The Scrutinizer System

Scrutinizer™ is at the foundation of the Plixer incident response and behavior analysis architecture. It is available as a physical or virtual appliance, or as a windows download. Scrutinizer performs the collection, threat detection, and reporting of all flow technologies on a single platform. It delivers real-time situational awareness into the applications and their historical behaviors on the network.

Enterprise Visibility

  • Massive scalability, supporting dozens of distributed collectors
  • Capable of archiving and analyzing several million flows per second
  • Topology mapping with active links
  • Deduplication and stitching across collectors

Individual Appliance

  • A single flow collection system supporting over 2000 flow sources
  • Collect up to 200,000 flows per second
  • All flow technologies supported on a single system (i.e. NetFlow, sFlow, IPFIX, J-Flow, NetStream, etc.)

Flow Analytics

  • Forensic audit trail reporting
  • Threat Detection of odd traffic patterns
  • Threat reputation support
  • Threat Index™ indicates weighted threat severity over time.
  • Archiving of raw data for decades

Advanced Reporting

  • Additional reports for Cisco, Palo Alto, Citrix and dozens of other vendors
  • Behavior Baselines and alerting based on abnormalities, compared to historical trends
  • Custom threat detection algorithms
  • Integration with Cisco ISE, RADIUS, or Microsoft for end user name identification
  • Design and build custom reports for exports from any vendor (e.g. Cisco NBAR, AVC, etc.)

Multi Tenancy

  • Support for hundreds of unique login accounts with access limited to specified data
  • Billing and invoicing support


  • Extends flow support in areas where NetFlow, sFlow, or IPFIX are not available
  • Detailed metrics on applications, response times, and usernames
  • Exports NetFlow and IPFIX

Flow Replicator

  • Eases the forwarding of flows from routers, switches, or servers to multiple collection systems
  • High speed architecture capable of 10GbE wire speeds
  • Leaves the originator address in tact
  • Available as in hardware or as virtual appliance

Additional Functions
Third Party Support and Cross Check is part of Advanced Reporting. It consolidates application alerts or errors and helps alleviate device naming inconsistencies between applications. The status of 3rd party applications is reflected in the Scrutinizer network maps.

Flowalyzer™: Real-Time Tool Kit for testing and configuring hardware or software for sending and receiving flow data.
Failover: For mission critical 100% availability.

    Recent NetFlow Analysis Blog Entries

    • If you’re an avid follower of our blogs, then you know that network threat detection using NetFlow analytics is a valuable enhancement to network monitoring. So then, integrating NetFlow and SIEM solutions takes network security to the next level, combining the ultimate threat detection solution with your existing Security information and event management solution. Isn’t […] The post Integrating NetFlow and SIEMs: Enterprise incident response solutions appeared first on

    • At the beginning of the year Dale wrote a blog on F5 Networks IPFIX Support. Today, I want to follow up on that post by explaining F5 IPFIX Configuration and configuring IPFIX logging for SIP DoS. These are the steps required to configure IPFIX logging of SIP DoS events on the BIG-IP system (specifically BIG-IP […] The post F5 IPFIX Configuration: IPFIX logging for SIP DoS appeared first on

    • Last week I was working with a customer who needed help with a Cisco NGA Configuration (NetFlow Generation Appliance). The customer was running the Cisco NGA 3140 (NGA3140-K9) model and had questions with how to setup version 5 versus version 9 NetFlow. In this blog I will take a look at steps needed to setup […] The post Cisco NGA Configuration Guide appeared first on

    • Most companies ask about security before outsourcing to a cloud service. The problem when asking this question is that, many of us don’t really question or test the claims of what the vendor tells us. Why should we, vendors are honest …..right? Actually, I think many of them are honest. The real problem that we […] The post Cloud Service Security Checklist : 7 Questions appeared first on


    "We have used Scrutinizer on multiple troubleshooting opportunities to isolate what type of traffic was causing the heavy utilization and also what offending devices were doing it. Scrutinizer has more than lived up to its expectations."

    Danny, Pension Benefit Guaranty Corp