All Posts

scottr
Security Operations

How to detect suspicious ICMP traffic

A few years ago, we added a behavioral algorithm to Plixer Scrutinizer that looked at all the flow data

Read More
khalil
Security Operations

How to detect a reverse SSH tunnel

Today we are going to talk about Plixer’s new Flow Analytics algorithm, Reverse SSH Shell, which has been included

Read More
dylan
Security Operations

STIX/TAXII for threat intelligence

What is STIX/TAXII? STIX stands for Structured Threat Information Expression, which is an open-source language and serialization format used

Read More
stephen
Network Operations

First look: Plixer’s machine learning engine explained

The purpose of this blog is to de-mystify the hype around machine learning (ML) by exploring three topics: What

Read More
jimd
Security Operations

Enhance NetOps/SecOps collaboration with Plixer’s new collections feature

I can’t tell you how many calls I’ve been on where the NetOps and SecOps teams really don’t know

Read More
elgin
Security Operations

How to detect bogon connections

Many ISPs filter bogon connections because bogon IP addresses have no legitimate use. If you find a bogon or

Read More
General

We’ve released our biggest update ever, plus two new products

One year ago, we announced our new vision. That is, we believe that SecOps and NetOps provide value for

Read More
jake
Security Operations

Detecting IP spoofing with Plixer Scrutinizer and Endpoint Analytics

A common tactic for bad actors to get a foothold into the network is to leverage IP spoofing to

Read More
briand
Network Operations

Advanced Silver Peak monitoring with IPFIX

Competition generally ends up being good for the consumer. It keeps prices down and forces innovation as vendors compete

Read More