Detecting Targeted Attacks

Posted in targeted attacks on August 28th, 2015 by mike@plixer.com
Detecting Targeted Attacks

Targeted Attacks are well-thought-out efforts combined with tuned pieces of software specifically engineered to penetrate your best security efforts. Detecting targeted attacks often requires a solution that evolves as the contagion changes.  Bad actors can spend weeks working with phishing attacks and other methods in an attempt to infect your internal users in order to learn about your internal resources and defense mechanisms.

Read more »

Michael Patterson
Founder and CEO

For a free 30 day trial of Scrutinizer, Download Now!

Tags: ,

How to Set the Interface Utilization Threshold

Posted in Scrutinizer on August 27th, 2015 by Justin
How to Set the Interface Utilization Threshold

Thresholds are an advanced feature available to all Scrutinizer users. When applied correctly, they can be used to automatically send notification of potential problems on network devices.  In this post, I would like to explain how to properly set the interface utilization threshold.  Read more »

Justin
Marketing Manager

Tags: , ,

Monitoring BYOD devices with NetFlow

Posted in BYOD, Cisco AVC, Cisco ISE on August 26th, 2015 by Jake
Monitoring BYOD devices with NetFlow

Monitoring BYOD with Netflow is becoming a huge concern on most people’s networks due to the added network load as well as the new security risks that they may pose. In this blog I hope to shed some light on some of the new features that Cisco has recently come out with to help track behavior on the network. Read more »

For a free 30 day trial of Scrutinizer, Download Now!

Tags: , ,

Monitoring DNS Traffic

Posted in cyber threat detection, detect network threats, Security on August 19th, 2015 by Jarryd
Monitoring DNS Traffic

 

It seems as if monitoring DNS traffic has become pretty popular lately. Our security team just utilized DNS traffic records shown in NetFlow in order to catch an infected Macbook on our Network and just yesterday, we discovered an iPhone reaching out to a plethora of Non Existent Domains.

Read more »

Tags: , ,

Configure Cisco ISE NetFlow

Posted in Cisco ISE, Cisco NetFlow, netflow configuration, Network Monitoring, REST API, Scrutinizer on August 14th, 2015 by Maciej
Configure Cisco ISE NetFlow

In order to configure Cisco ISE NetFlow, we’re going to take advantage of Scrutinizer’s API (Application Program Interface) by enabling ERS (External RESTful Services), on the ISE appliance. Read more »

Maciej Walichnowski
Tags: , , ,