2019 marks Plixer’s 20th year providing network analytics solutions to IT teams all over the world. From the beginning, we have strived (and continue to strive) to listen closely to your needs—the needs of the professionals who keep their organizations safe and who enable their colleagues to do their best work.Read more
Virtualization offers many benefits to organizations. But at the same time, you’ll have to figure out how to monitor your virtual environment, because a lack of visibility can cause many problems. This blog will cover how organizations can use Scrutinizer to take full advantage of a virtual environment without the accompanying challenges.
Things move fast in cybersecurity, and it’s always worth investing time to stay up-to-date on the state of the field. I’ve gathered 15 articles all about cybersecurity news and insights to provide some food for thought.
Although it ought to be a basic task, patch management has nearly gotten out of control. Many vendors, to their credit, are quick to release patches when they discover issues. But there are more devices and applications on today’s networks, and an ever-growing list of threats to worry about. These factors combined have made it exponentially harder to keep up with patch management. So, dear reader, by the end of this blog I want you to come away with some strategies to make your life easier.Read more
It’s an exciting time in medicine. Technology is constantly making healthcare more accessible, more precise, and more convenient. For instance, IoT in healthcare can increase hospitals’ efficiency in many ways. But you should also be prepared for the risks it brings.
As we’ve inched closer and closer to quantum computing, quantum cryptography has become a greater concern. We haven’t yet created a quantum computer that’s faster than the binary computers we use today, but it’s possible that this will change within a few years. While this opens up a lot of possibilities, quantum computers will likely be able to break many current encryption protocols.
In computer science, the concept of network layers is a framework that helps to understand complex network interactions. There are two models that are widely referenced today: OSI and TCP/IP. The concepts are similar, but the layers themselves differ between the two models.
Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used to make better decisions—troubleshooting decisions, threat remediation decisions, business planning decisions, etc. But let’s take a closer look at what network analytics entails, some use cases, and what types of organization can derive the most value from it.
In my experience, most conversations on how to protect customer data revolve around active companies. Certainly important, but what about bankrupt companies? That data doesn’t simply disappear when the organization declares bankruptcy. And in many cases, the bankrupt company doesn’t destroy the data. So in whose hands does our PII end up?
IT budgets require a lot of thought, but the process of planning, organizing, and presenting your budget doesn’t have to be painful. In fact, a well-developed IT budget can be a focused road map for your IT strategy. You’ll avoid “wish list” budgets that support the false view that IT is a cost center rather than a profit center.