Ransomware targets increase with IoT vulnerabilities

Posted in Security on May 25th, 2016 by Jimmyd
Ransomware targets increase with IoT vulnerabilities

Face it—the information technology arena is an ever-changing monster and recent news about the increase with IoT vulnerabilities is no exception. A new technology can come around all of a sudden and change how we think and do things. Don’t get me wrong; it’s exciting and it’s what our world has been built on, but it’s also a little nerve-wracking. This becomes a bigger issue in the world of security, since newer technology tends not to be completely vetted. Read more »


Jimmy D the Netflow Detective

For a free 30 day trial of Scrutinizer, Download Now!

Join the NetFlow Developments group on LinkedIn.

Tags: , ,

DNS Firewall : Free Update to Bind

Posted in General on May 19th, 2016 by tomp@plixer.com
DNS Firewall : Free Update to Bind

Recently we went through an exercise which turned our DNS into a firewall for a well-maintained list of requested hostnames.  It was designed to work with our host reputation feed that is provided to our FlowPro Defender customers who use it to uncover internal end systems that are reaching out to Internet systems that are known to host malware.

Read more »

- Thomas Pore

For a free 30 day trial of Scrutinizer, Download Now!

Tags: ,

VMware NSX IPFIX Exports

Posted in IPFIX, vmware ipfix on May 18th, 2016 by Jeff
VMware NSX IPFIX Exports

With the growing number of vendors supporting Flow based technologies, we’re seeing a rise in use cases and possibilities for flow analysis and performance monitoring. Even though there has been exponential growth in flow reporting over the last few years, we in the industry are always left with questions, what are we missing? Where can we gather more information? Are we really getting 100% visibility into our network traffic? The answer here is simple, there’s always room to grow!

One area in which flow exports have been missing, is in our virtual environments. We know we can capture our traffic on our physical hardware. When an end user reaches across the internet to load content from a webpage, we can meter this traffic at each hop. We see the traffic as it hits the switch, router and then the firewall. This is all incredibly valuable information, but what about our Virtual Machines? Currently, getting visibility into the communications that never leave our virtual environments is limited. Fortunately, companies are starting to close that gap! VMWare, for example, now has support for exporting IPFIX elements from a Virtual Distributed Switch. This is a huge advancement! Let’s take a look at what their exports have to offer.

Read more »

Jeff Morrison

For a free 30 day trial of Scrutinizer, Download Now!

Tags: , ,

Cryptolocker Detection On Your Network

Posted in cyber crime on May 11th, 2016 by Joanna Buckley
Cryptolocker Detection On Your Network

It lurks on the internet, it hungers for personal information, it waits until you download that seemingly innocent file… it’s Cryptolocker.

Read more »

Tags: ,

Flow Replicator Vs UDP Forwarder

Posted in General on May 7th, 2016 by Patti
Flow Replicator Vs UDP Forwarder

Recently a customer called in asking about our UDP Forwarder.  At first I wasn’t sure what they were talking about but, as they explained what they were looking for, it dawned on me that they were actually referring to our Flow Replicator.

Read more »

Patti

For a free 30 day trial of Scrutinizer, Download Now!

Tags: ,