Bluecoat NetFlow Support Recap

Posted in Bluecoat on October 30th, 2014 by Justin
Bluecoat NetFlow Support Recap

blue coat logoOver the last five years or so, I have noticed that one of the major topics we get requests for is Bluecoat NetFlow support. While it may surprise many, we have supported Bluecoat exports for quite some time; in fact, if you look back, and that’s what I intend to do, you will see that we’ve supported Bluecoat for years. We have a good deal of information[1][2][3] and my goal is to help you find what you are looking for in this Bluecoat NetFlow support recap. Read more »

Justin
Marketing Manager

Tags: , ,

Plixer is Growing and Hiring: Jobs in Southern Maine

Posted in General on October 29th, 2014 by Justin
Plixer is Growing and Hiring: Jobs in Southern Maine

Good News!  Plixer is growing and we have several positions open in Sales, Support and Software Development.  Plixer International is one of the fastest growing malware incident response companies in the industry. Founded in 1999, Plixer works with some of the largest networks in the world. Our solutions provide a holistic view of the entire enterprise regardless of equipment vendor. Our software engineers work directly with customers to ensure that the tools quickly help pin-point bottlenecks and security threats.

Read more »

Justin
Marketing Manager

Tags: , ,

Detecting Rogue DHCP Servers

Posted in detect network threats on October 29th, 2014 by Scottr
Detecting Rogue DHCP Servers

A rogue DHCP server on a network is one that is not under the administrative control of the network staff. It can be a network device such as a modem or a router connected to the network by a user who may be either unaware of the consequences of their actions, or may be knowingly using it for attacks on the network.

As clients connect to the network, both the rogue and legal DHCP server will offer them IP addresses as well as the addresses of the default gateway and DNS servers. If the information provided by the rogue DHCP differs from the real one, clients accepting IP addresses from it may experience network access problems, including speed
issues as well as inability to reach other hosts because of an incorrect IP network or gateway. In addition, if a rogue DHCP is set to provide as default gateway an IP address of a machine controlled by a misbehaving user, he can sniff all the traffic sent by the clients to other networks, violating network security policies as well as user privacy.

Read more »

Scott Robertson
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!



Tags: , ,

Flexible NetFlow: NBAR NetFlow configuration

Posted in netflow configuration, network security on October 22nd, 2014 by Joanne
Flexible NetFlow: NBAR NetFlow configuration

Did you ever consider that using Flexible NetFlow, specifically an NBAR NetFlow configuration, could provide another aspect of network security for you?

Exporting NBAR (Network Based Application Recognition) in Flexible NetFlow records provides the opportunity for deep packet inspection visibility in NetFlow reporting.  Once you have that visibility, you’re just a half step away from also using that information for detecting unwanted traffic on your network.

Read more »


Joanne Ghidoni
Sr. Solutions Engineer

For a free 30 day trial of Scrutinizer, Download Now!

Sign up for Advanced NetFlow Training™ coming to a city near you!

Tags: , ,

How To Investigate Malware

Posted in cyber attack, incident response on October 16th, 2014 by Patti
How To Investigate Malware

If you are looking to learn about how to investigate malware, chances are you’re already infected and under the gun to uncover the source and clean up the mess. Here are a few things to consider before you dig in.

Incident Response System

Read more »

Patti

For a free 30 day trial of Scrutinizer, Download Now!

Tags: , ,