Our growing customer list of Service providers across the world look to Plixer to help them scale globally and adapt to emerging technologies and increasing complexity while reducing the cost of service delivery. This effort helps ensure higher levels of user experience to reduce customer churn.

As more and more service providers move to IP-based networks, they are faced with assuring services over increasingly dynamic operating environments. Visibility into network usage, consumer behavior and application diversity across markets is critical for providers to optimize the infrastructure to support the quality of service that customers demand.

With Plixer Scrutinizer NetFlow & sFlow traffic analysis and IPFIX reporting, you will have the industry's deepest levels of visibility, accountability, and measurability required for managing service delivery and the customer experience while ensuring and maintaining new multimedia applications, cloud and managed services, and advanced technologies like VoIP, video, and IP Multimedia Subsystems (IMS). This is all provided while Scrutinizer's Multi-Tenancy capability provides your customers with a unique and secure reporting experience.

10 Reasons Service Providers Choose Scrutinizer

  • Advanced threat detection: NetFlow and flow analysis techniques provide a unique perspective on network traffic that can't be found in traditional signature-based technologies such as UTMs, IPSs, and next-gen firewalls. For example, watching host traffic for odd communication ratios (e.g. flow volumes to byte and packet counts) can often lead to accurate detection of DDoS attacks. By comparing IP Addresses to host reputation databases, you can detect botnets that could be part of a larger Advanced Persistent Threat (APT) underway against the customer's environment. Security-based flow analysis is a major differentiator for the MSSP that makes use of it.
  • Visibility across the customer's entire network: You can't manage what you can't see. End-to-end visibility of the customer's environment is key. Hop-by-hop, router-to router-network path visibility of a flow through the infrastructure provides the MSSP with the ability to troubleshoot issues with an IPS, firewall, or other network access control. NetFlow provides end-to-end visibility. It's present everywhere, from network edge to access.
  • Scalable network auditing: large customers generate hundreds of thousands of log events, each describing some unique aspect of network and server access. High speed NetFlow collection technology such as that provided by Scrutinizer can offset the need for cumbersome syslog and SNMP-based logging strategies. And while some SIEM and log management solutions can accept NetFlow, MSSPs are warned against selling themselves short with checkbox NetFlow solutions.
  • Rapid access to incident details and forensics: Fast drill-down ability to identify the malware culprit is imperative. Where is the ingress connection of a particular host? Where did the problem begin? Again, NetFlow can be the saving grace here. 24/7/365 visibility into all network activity solves the problem of figuring out what was going on at the time of the attack.
  • Flexible reporting: This separates the toys from the solutions. Advanced NetFlow collection technology can provide detailed reports on hosts, critical networks, incidents, and attackers. Determining who omits elements exported in NetFlow or IPFIX is quick way to shorten the list of NetFlow collector vendors you should consider.
  • Multi-tenancy: Secure login per customer with reports catered to each customer's network is critical; all MSSPs know this. Again, NetFlow reporting can further augment the level of detail the MSSP can provide to its customer base, but only if the NetFlow collector supports multi-tenancy.
  • Service responsiveness and uptime: What is the end user experience to the MSSP's cloud-based service portal? What is the round trip time? How do connection times to a resource compare to other customers? NetFlow through integration with such technologies as Cisco's MediaNet provide this information in addition to everything else mentioned above.
  • Rapid deployment and implementation: As customers grow through acquisitions or new datacenter additions, the MSSP must be able to gain rapid visibility into the new additions. NetFlow-based monitoring requires no additional hardware—it's already in the network. The customer need simply turn it on.
  • Efficient firewall log collection: this bullet is something of a work in process, but the firewall industry is slowly migrating syslog to NetFlow and IPFIX.
  • Ideal for a cloud-based MSSP: NetFlow and IPFIX are lightweight and can be transported anywhere—across WANs, through VPNs, and even from the customer's routers directly to the MSSP. Unlike traditional packet capture technologies that require the MSSP to log into a device located at the customer premise, flows travel unidirectionally (like syslog or SNMP traps) and can be accessed locally at the MSSP.

Read one of our many case studies.

  • "Application problems are the largest source of down-time, responsible for 30 percent of downtime hours and 32 percent of downtime cost."

    Jeff Wilson, Infonetics