Good News! Plixer is growing and we have several positions open in Sales, Support and Software Development. Plixer International is one of the fastest growing malware incident response companies in the industry. Founded in 1999, Plixer works with some of the largest networks in the world. Our solutions provide a holistic view of the entire enterprise regardless of equipment vendor. Our software engineers work directly with customers to ensure that the tools quickly help pin-point bottlenecks and security threats.
Author: Justin
F5 IPFIX Configuration: IPFIX logging for SIP DoS
At the beginning of the year Dale wrote a blog on F5 Networks IPFIX Support. Today, I want to follow up on that post by explaining F5 IPFIX Configuration and configuring IPFIX logging for SIP DoS.
PCI DSS Compliance
Due to potentially steep fines and loss of customer good will, retail and financial services companies are guardedly concerned about PCI (Payment Card Industry) compliance. The PCI Data Security Standard (PCI DSS) is a set of prescriptive data security specifications laid out to ensure the safe handling of cardholder information at every stage. The PCI DSS provides an actionable framework for developing a robust payment card data security process — including prevention, detection, and appropriate reaction to security breach incidents. In a previous blog we briefly explain how NetFlow helps you maintain PCI compliance. This blog will educate you on how Scrutinizer accomplishes PCI DSS Compliance specific to individual requirements. Read more
Securing SCADA systems with NetFlow
Supervisory Control and Data Acquisition (SCADA) is a system that provides control of remote equipment. Such equipment, including heating, ventilation, and air conditioning (HVAC) systems, however, has been found to be connected to the Internet in some cases with inadequate security. This, understandably, provides hackers with a potential gateway to critical corporate systems.
5 Metrics Cloud Services Can’t Hide From
With the growing number of cloud services and applications, companies are becoming more concerned about these applications absorbing their Internet connections. This is creating a need for improved cloud service monitoring solutions. IT departments want to know how they can reliably monitor these applications and answer questions such as, “how much bandwidth is each application consuming?” or “why is performance poor?” The infrastructure needed to answer questions like these are already in place on most networks, but it can’t be done with SNMP, ping utilities, or packet probes as these solutions don’t scale. We need to take advantage of a smarter, deeper analysis, architecture and we need to know how to leverage it. Allow me to reveal five best practices for: Read more