All General

Network Forensic Analysis

When an incident or threat occurs on our networks today one of the more plaguing questions that comes up is “How can I leverage...

How to deploy a Flowpro Virtual Appliance

Today I want to talk about how to deploy a Flowpro Virtual Appliance. With the Flowpro Virtual Appliance, you can get that visibility into...

Protect Against Cyber-Attacks

According to a recently released report by Standard and Poor, lenders could have their credit rating lowered if they fail to protect themselves from...

Elasticsearch NetFlow Integration

UPDATE: You can download our Kibana integration for Scrutinizer here: https://files.www.plixer.com/resources/configs/scrutinizer-elk.zip Our support team recently received a request for Elasticsearch NetFlow Integration. For those...

Splunk NetFlow Integration

We took some time recently to get our Splunk NetFlow integration working. Apparently, there are a few customers who are looking to get from...

Lax Companies Now Legally Liable for Credit Card Theft

For too long, some companies have shirked their responsibility to protect their customer’s personal information. Furthermore, it is believed that these companies simply gave...

Multi-layered security plan

You already understand the importance of having a multi-layered security plan if you read anything about cybersecurity.  We often talk about it on our blogs, too,...

Juniper MX NetFlow Configuration

Juniper MX5 NetFlow Configuration Recently while looking at my router’s NetFlow reporting, I came across an issue regarding the Juniper MX5 router’s NetFlow configuration....

DNS Command and Control Detection

This morning our malware incident response system triggered an event for suspected DNS “Command and Control” activities. Our security team jumped on it and...

Detecting DDoS With Netflow

In the past few months, I’ve noticed that the number of support calls we’re taking for help using our NetFlow Analyzer for detecting DDOS...