How to monitor VoIP Traffic | VoIP monitoring

Posted in General on April 23rd, 2014 by Jake

This blog aims to do one thing, show you how to monitor VoIP traffic on your network. I get questions, almost daily, asking, “How can we use NetFlow to trouble shoot call quality issues?” Customers are usually shocked when I show them how easy it is to do. First we will need to go over what actually qualifies as a “call quality issue”.

Read more »

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

Identifying and Managing Shadow IT in the Enterprise

Posted in General on April 21st, 2014 by Steve
Identifying and Managing Shadow IT in the Enterprise

Many devices that are placed on the corporate networks can fly under the radar of the IT departments watchful eye. These devices include smart phones, wireless access points, tablets, home laptops and other types of computer hardware.  In some cases, employees make VPN connections from non-corporate owned computers and leave them connected for days or even weeks.  All of these devices take up corporate resources and put the company at greater risk for malware and electronic theft.  What can be done?

Read more »

Steve

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Fortinet IPFIX Support

Posted in Network Monitoring on April 16th, 2014 by Scottr
Fortinet IPFIX Support

Fortiswitch-1000: Using IPFIX for Network Security ForensicsDid you know there is Fortinet IPFIX support on their FortiSwitch-1000 switch?  The other day I was working with a customer who mentioned configuring his Fortinet for IPFIX.  This was a bit of a surprise to me because most Fortinet network devices that I’ve worked with support only sFlow. He said that he had a FortiSwitch-1000, and that it does offer IPFIX Support.

Why is Fortinet IPFIX support such an important change?

Read more »

Scott Robertson
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!



Tags: , ,

Detecting Network Threats

Posted in network threat detection on April 9th, 2014 by Joanne
Detecting Network Threats

Do you have a solution in place for detecting network threats?  If you say no, you are not alone.  Or maybe you have firewalls blocking the unwanted network traffic.  Either way, you may be interested in network behavior analysis, another network threat detection option to consider.  Read more »


Joanne Ghidoni
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

Incident Response Plan for Cyber Attacks: Part 2

Posted in cyber crime, cyber threat detection on April 7th, 2014 by mike@plixer.com
Incident Response Plan for Cyber Attacks: Part 2

This is part 2 of a two part post on Incident Response Plan for Cyber Attacks. The other post left off at listing the responsibilities that are often assigned to IRT members.  Below the list continues: Read more »

Michael Patterson
Founder and CEO

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: ,