All General
mikel

Windows 7 end of life is here: how to monitor Windows 7 traffic

Are you ready for the end? January 2020 it will come to an end. We all knew it was coming. But what now? Servers...

stephent

Better wireless impression tracking: how Scrutinizer correlates MAC ID, Token ID, RFID, and wireless metadata

If you use Cisco’s wireless solutions or Aruba Wireless, you already know how important impression tracking is. There are some strong IPFIX elements that...

jeffm

The importance of monitoring and correlating your wireless network traffic

I’m often asked, “if I already have a solution to monitor this segment of the network, why do I need a solution that will...

Plixer a fresh perspective

Plixer—a fresh perspective

2019 marks Plixer’s 20th year providing network analytics solutions to IT teams all over the world. Today we’re launching a new identity....

critical infrastructure

Protecting Critical Infrastructure from Cyberattacks with Network Traffic Analytics

According to a recent New York Times’ article, there have been cyberattacks on critical infrastructure Saudia Arabia recently. While these attacks were not elaborated...

Correlating NetFlow with RADIUS Usernames

Correlating NetFlow with RADIUS Usernames to improve context security awareness is something we have done for several vendors including Cisco ISE, Microsoft Network Policy...

The Danger of Google’s Massive Harvesting

It’s pretty safe to say that most users are well aware that companies like Google, Facebook, LinkedIn and hundreds of others are harvesting data...

UDP Packet Forwarding

If your company has a couple of SIEMS or maybe more than one NetFlow collector, you could probably benefit from a UDP Packet Forwarding...

User Authentication Monitoring

Despite continued improvements in malware prevention, the success rate of infections still out paces the industries best detection methods. This is true even though...

DNS Unlocker Malware

Our malware detection team plays particularly close attention to DNS traffic because a lot of serious exfiltration occurs as the result of DNS abuse. ...