Radius Authentication in Scrutinizer

Posted in NetFlow Security on August 24th, 2016 by Joanna Buckley
Radius Authentication in Scrutinizer

When it comes to network security there are dozens of factors that we always need to consider. Can we block malicious traffic? Are we able to prevent data from leaving our network? What about threats that come from inside the network? The list goes on and on. One additional thing to think about is secure authentication. If a user’s credentials become compromised that can pose a serious issue. Suddenly, someone on the outside now has the ability to log in and start sending data out. Furthermore, this bad actor now has access to business critical applications. The question then becomes, what can we do to make sure users are logging in to critical applications safely? In this blog, I will highlight how Scrutinizer now offers RADIUS authentication support for secure log ins.

Read more »

Tags: ,

Gigamon NetFlow Generation

Posted in IPFIX, Security on August 17th, 2016 by Jake
Gigamon NetFlow Generation

Here at Plixer we often try and work with vendors when they are developing their NetFlow exports. Recently, Gigamon announced that they will be adding more IPFIX elements to their exports to provide more context to the traffic you are monitoring. In this blog I will go over what types of exports have been announced and the importance of them in the context of security and performance monitoring. Read more »

For a free 30 day trial of Scrutinizer, Download Now!

Tags: ,

Companies you trust are stealing from you

Posted in General on August 16th, 2016 by Justin

Have you ever wondered which companies you trust are stealing from you? Probably not. When we purchase something new, in most cases there is an unspoken understanding about the transaction. For example, if it is food, you can read what is in it and purchase it. If you don’t end up liking the taste, it probably won’t kill you. If we buy a car, it is assumed that it will meet all safety standards. If we purchase a widget of some sort for a specific purpose, it will do what it advertises, else we will return it for a refund. When it comes to software, the rules are generally the same; however, there seems to be an emerging twist in the market: data theft. Data Leakage

Read more »

Justin
Marketing Manager

Tags: , ,

Catch Reflection DDoS Attacks with NetFlow

Posted in detect network threats, incident response, Security on August 10th, 2016 by Jarryd
Catch Reflection DDoS Attacks with NetFlow

In this line of work I find myself talking with network professionals daily. With this constant exposure to a variety of network environments and people, certain terms tend to float to the surface. Lately DDOS and Reflection DDoS attacks are on the threats to discuss. They are becoming easier to conduct and larger in scale, and due to the lack of network visibility we can clearly see why there would be an upward trend in the frequency of attacks. Today we are going to take a look at a member of the denial of service family, DRDoS (Distributed Reflection Denial of Service) attacks and how we can harness the power of NetFlow to catch and monitor these attacks.

Read more »

Jarryd Boyd

Sales Engineer

Tags: , , ,

Google Map Integration | GPS Coordinates

Posted in General on August 6th, 2016 by tomp@plixer.com
Google Map Integration | GPS Coordinates

We were an early adopter of supporting Google map integration in our NetFlow collector system. Since then, we have had customers asked that we pull in the location information from SNMP (syslocation), IPAM solutions and other GPS coordinate applications in order to avoid a manual process.

Read more »

- Thomas Pore

For a free 30 day trial of Scrutinizer, Download Now!

Tags: