How do you know who’s accessing your data? Do you know if your data has been copied to other locations? Have you put enough resources into securing your confidential data? Organizations who don’t have solid answers to these questions probably don’t have a system for data governance in place. In this blog, we’ll cover the basics of data governance and how you can incorporate it in your organization’s security strategy.Read more
In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and policy makers, and what happens to your private health information when a pharmacy is acquired.Read more
Digital transformation is crucial whether you lead a small business or an enterprise. But it’s hard to do, expensive, and unfortunately, the odds of success are low. So how can IT and security leaders step in to improve the odds and become invaluable to the organization brand?Read more
We’ve reached our last roundup post of the year (and the decade!). This quarter’s interesting articles included yet another example of tech meant to protect children endangering them instead; how we’ve all trained AI for years without realizing it; a truly bizarre solution for poor user-chosen passwords, and more.Read more
If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins and outs of this framework, including why it’s crucial to modern networks and the best practices to implement and maintain it.Read more
If you need to meet a business or developmental goal, performing a gap analysis is a great way to illuminate how to reach that goal. After reading this blog, you’ll know what gap analysis is and how to conduct it—plus you’ll be armed with a ready-to-go template to help you get started.Read more
2019 is flying by fast, and there were many developments in cybersecurity during the third quarter. From the rise of deepfakes and AI to the controversy over extended validation—read on to get yourself up to date on the most interesting news and ideas in cybersecurity.Read more
Insider threats bypass traditional security systems, which focus on the network perimeter. This is because, as the term suggests, the attack originates from behind most defense systems. Unfortunately, insider threats are more common than you may think. But this blog will arm you with the knowledge you need to start combating this insidious type of cyberattack.Read more
Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. Once again, I’ve gathered 13 articles all about cybersecurity news and insights to provide some food for thought.Read more
2019 marks Plixer’s 20th year providing network analytics solutions to IT teams all over the world. From the beginning, we have strived (and continue to strive) to listen closely to your needs—the needs of the professionals who keep their organizations safe and who enable their colleagues to do their best work.
This aspect of Plixer hasn’t changed. But today we’re launching a new identity with a fresh perspective.
A logo isn’t a brand. Nor is a color palette or a new font.
A brand is a reflection of the company’s vision and the relationships their audience forms with them. The visual language is an extension of that. Starting with Battery Ventures’ acquisition of Plixer last year, and with bringing on Jeff Lindholm as our new CEO, we’ve grown a lot in a short time. We’ve refocused our roadmaps for Scrutinizer, FlowPro, and Replicator, expanded to new and changing markets, and added many highly experienced people to the Plixer team.
We felt that our brand no longer aligned to our vision.
We believe that NetOps and SecOps provide value for each other, and that value should be accessible from a single place. When network and security teams access information from a shared platform, something unexpected happens. Hidden patterns emerge and anomalies stand out. Important insights become clear, leading to smarter decisions that make the organization safer and more efficient. Plixer has created a powerful platform for analyzing, evaluating, and visualizing the millions of conversations that cross networks every second. When network and security teams access common data, they start speaking the same language helping the entire organization soar.
Our reinvigorated vision drives us toward a people-centric mindset and away from the fear-mongering that is, unfortunately, so common in our industry. We know that you know the threats and challenges you face, and you’re already stressed out beyond belief. Plixer isn’t going to add to that—we want to relieve stress and instill confidence. We want you to feel valued.
Plixer’s new visual identity is simple and direct in its look and feel. We’ve built it around a unique illustration style that not only helps us stand out in a sea of security & network sameness, but also creates a unique way to communicate the benefits of our offerings. In addition, many of these illustrations—we call them pictograms—tell a human-centered story, because we recognize that humans will always be an important part of the equation.
We’ve also begun an ongoing effort to ensure that everything we write starts with clear, straightforward language. There will be much less technical and business jargon. Instead, we strive to address topics simply, with respect for the reader by not trying too hard.
Starting today, you’ll see our new brand identity roll out across our major social media platforms and, of course, our website.
But remember that behind the new look, we’re still the same core Plixer: candid, courageous, and reliable.