Network Forensic Analysis
When an incident or threat occurs on our networks today one of the more plaguing questions that comes up is “How can I leverage...
When an incident or threat occurs on our networks today one of the more plaguing questions that comes up is “How can I leverage...
Today I want to talk about how to deploy a Flowpro Virtual Appliance. With the Flowpro Virtual Appliance, you can get that visibility into...
According to a recently released report by Standard and Poor, lenders could have their credit rating lowered if they fail to protect themselves from...
UPDATE: You can download our Kibana integration for Scrutinizer here: https://files.www.plixer.com/resources/configs/scrutinizer-elk.zip Our support team recently received a request for Elasticsearch NetFlow Integration. For those...
We took some time recently to get our Splunk NetFlow integration working. Apparently, there are a few customers who are looking to get from...
For too long, some companies have shirked their responsibility to protect their customer’s personal information. Furthermore, it is believed that these companies simply gave...
You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity. We often talk about it on our blogs, too,...
Juniper MX5 NetFlow Configuration Recently while looking at my router’s NetFlow reporting, I came across an issue regarding the Juniper MX5 router’s NetFlow configuration....
This morning our malware incident response system triggered an event for suspected DNS “Command and Control” activities. Our security team jumped on it and...
In the past few months, I’ve noticed that the number of support calls we’re taking for help using our NetFlow Analyzer for detecting DDOS...