Blog
Search blog posts
Choose a Category

Why Other NDR Solutions Are So Expensive
If you started to research NDR solutions to any degree, you’ve likely noticed that most vendors use packet infrastructure to monitor, ingest, and analyze traffic for threat activity. Packet analysis is a very popular threat detection method, but it has shortcomings that may not seem obvious at first glance. For

Using MITRE ATT&CK® with the Plixer Platform
Any security analyst will tell you that the most challenging part of the job is knowing what to respond to. There is no shortage of alarms or oddities that spark action in a security operations center. Being able to confidently prioritize your efforts is key to keeping your business safe

Adding Endpoint Analytics to Flow Data
When we think about the world of Network Flow data, we usually think within Layers 3, 4, and 5. Typically IP addresses are as close to the endpoint as we get. Sometimes that is good enough, but more often some type of lookup or investigation must occur to figure out

The importance of encrypted traffic analytics to your network security posture
Data security is a critical aspect of any organization’s IT infrastructure. With the explosion of cyber threats, it has become ever-important to ensure that your network is protected. While there are many ways to protect your network, having information related to encrypted network traffic is one of the most effective

3 Factors When Considering a Network Detection and Response Platform
It’s a cliche at this point to discuss the “ever-evolving threat landscape”. Cliché or not, the fact remains that attackers continue to become more sophisticated. Today’s threats show that legacy detection is insufficient, and behavior-based detection is critical. A Network Detection and Response (NDR) platform is a key component of

3 cybersecurity trends you should pay attention to
How prepared for an attack are you? The most recent Microsoft Defence Report found volume of password attacks has risen to an estimated 921 attacks every second. The rise of cyber attacks and data breaches has made it imperative for organizations to invest in robust cybersecurity measures. The threat landscape