• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • Internet Threat Center
  • Blog
  • Contact
  • Weekly Demo
  • Search

Plixer

Network and Security Intelligence Platform

Menu
  • Solutions
    • Overview
      • Incident Response System
      • Behavior Monitoring
      • BYOD Monitoring
      • Voice and Video Monitoring
      • Compliance Assurance
      • Virtualization Visibility
      • Cloud Service Monitoring
    • Industries
      • Education
      • Financial Services
      • Retail
      • Healthcare
      • Service Provider
      • Government
    • Your Role
      • CEO or IT Executive
      • Network Admin
      • Security Analyst
      • Application Engineer
      • VMware and Server Admin
    • Why Plixer
  • Products
    • Scrutinizer
      • Scrutinizer Overview
      • Network Analysis
      • Security Analytics
      • Multi-Tenancy
      • Advanced Reporting
      • Distributed Data Collection
      • Install Options
      • Request a Quote
      • Download Options
      • Trade-In Program
      • Competitor Worksheet
    • Flow Replicator
      • Replicator Overview
      • Flow Replicator Evaluation
    • FlowPro
      • FlowPro Overview
      • FlowPro Evaluation
      • Request a Quote
    • Free Downloads
      • Scrutinizer
      • Flowalyzer
      • IPFIXify
  • Support
    • NetFlow, IPFIX, & sFlow Configuration Guide
    • Available Scrutinizer Updates
    • End of Life Policy
    • Scrutinizer Manual
    • FlowPro Manual
    • Replicator Manual
    • FAQ
    • Services
    • Training Videos
  • Resources
    • White Papers
    • Case Studies
    • Webinars
    • Brochures
    • Solutions Briefs
    • Forensic Investigation Kit
    • Free Book Compliments of Plixer!
  • Partners
      • Partners
        • Find a Partner
        • Become A Partner
        • Partner Login
      • Technology Alliance Partners
        • Additional Integration
        • Cisco Systems
        • Citrix Systems
        • Endace
        • Gigamon
        • Ixia
        • Paessler – PRTG
        • Palo Alto Networks
        • VMware
        • Splunk
  • About
      • Company Overview
      • Awards
      • Our Culture
      • Careers
      • Our Customers
      • Community Outreach
      • Events
      • Press Releases
      • In The News
Home > Blog > IoT
IoT lock control

01.31.19 by Justin

The dangers of IoT devices and what you should know

IoT devices are dangerous! Now, I know what you are thinking, “Justin, IoT devices provide convenience and make many mundane parts of life so much more interesting.” Consider, however, that many of the IoT devices on the market are designed with little care or … [Read more...] about The dangers of IoT devices and what you should know

IoT

IoT in Healthcare

01.02.19 by Alienor

IoT in Healthcare: Managing The Opportunity & The Risk

It’s an exciting time in medicine. Technology is constantly making healthcare more accessible, more precise, and more convenient. For instance, IoT in healthcare can increase hospitals’ efficiency in many ways. But you should also be prepared for the risks it … [Read more...] about IoT in Healthcare: Managing The Opportunity & The Risk

IoT

IoT Threat Surface

10.30.18 by Justin

How to reduce your IoT threat surface

Recently, there has been an increase in distributed denial-of-service (DDoS) attacks that involve the use of compromised IoT devices like IP cameras, and it is extremely common today for organizations and consumers to purchase IoT devices. So how can … [Read more...] about How to reduce your IoT threat surface

IoT

IoT Security: The Nightmare After Christmas

12.20.17 by Traci Anderberg

IoT Security: The Nightmare After Christmas

What's this? What's this? There's IoT devices everywhere! … [Read more...] about IoT Security: The Nightmare After Christmas

IoT

IoT security trends and challenges

11.16.17 by Alienor

IoT Security Trends & Challenges

Before you read this blog, stop and count every electronic device around you. I’m at my work desk; within a 1-meter radius, I have ten electronic devices. In a few years, if I replaced each item with freshly launched products, at least nine of those devices … [Read more...] about IoT Security Trends & Challenges

IoT

The Risk Continuum

07.27.17 by Bob Noel

Using NetFlow and Metadata Analysis to Reduce IoT Security Risks

The Internet of Things (IoT) describes the wide array of devices (beyond traditional computers and mobile phones) that are today, or will be in the future, connected to the internet. According to Gartner, there will be 20.4 billion connected devices by 2020. … [Read more...] about Using NetFlow and Metadata Analysis to Reduce IoT Security Risks

IoT

IoT - Internet of Things

07.12.17 by Jarryd Boyd

IoT Security with NetFlow/IPFIX

With billions of devices coming online yearly, the world of IoT (Internet of Things) is upon us. Unfortunately, like any new technology, form and function greatly outweigh security, leaving businesses and individuals exposed. Due to this general disregard … [Read more...] about IoT Security with NetFlow/IPFIX

IoT

Least Privilege

05.30.17 by Alienor

IoT: What is Least Privilege?

Can you say with certainty that none of your network devices have ever been pulled into a botnet army? If you don’t operate under the principal of least privilege, it’s likely that you can’t. This article will provide an overview of what least privilege means, … [Read more...] about IoT: What is Least Privilege?

IoT

Child with toy

02.28.17 by Justin

Protecting our privacy in the Internet of Toys

It turns out, we were right; we just were looking at the wrong toys. In a recent article on Softpedia, Gabriela “Gaby” Vatu provides confirmation of what we have believed would happen with the continuing emergence of IoT. Effectively, internet-connected … [Read more...] about Protecting our privacy in the Internet of Toys

IoT, Privacy

investigating-the-barbie-hello-dreamhouse

12.19.16 by Michael

Connected Christmas Toys and Your Children’s Data Privacy

It has been a few months since we posted our white paper titled, “How Companies You Trust Are Stealing From You." Since then, we decided to investigate a couple of Internet-connected children's toys to monitor the traffic and determine if they too are taking … [Read more...] about Connected Christmas Toys and Your Children’s Data Privacy

IoT

sidebar

Blog Sidebar

Subscribe to our blogs

Recent Posts

  • How to Configure Meraki for SNMP Polling
  • Why ERSPAN is Important for Network Security
  • The dangers of IoT devices and what you should know
  • Real-Time DDoS Detection & Analysis
  • Cisco ASA Access List Reporting

Search Top Blog Categories

Configuration
Cyber Attack
Cybersecurity
Incident Response
IoT
NetFlow Monitoring
Network Monitoring
Network Security
Network Traffic Analysis
Network Traffic Monitoring

All Blog Categories

Footer

Social Media

FacebookTwitterYoutubeLinkedin

68 Main St Ste 4
Kennebunk, ME 04043
+1 (207) 324-8805
+1 (207) 324-8683

Solutions

  • Incident Response System
  • Behavior Monitoring
  • BYOD Monitoring
  • Voice and Video Monitoring
  • Compliance Assurance
  • Virtualization Visibility
  • Cloud Service Monitoring

Products

  • Scrutinizer
    • Network Analysis
    • Security Analytics
    • Multi-Tenancy
    • Advanced Reporting
    • Distributed Data Collection
    • Install Options
    • Request a Quote
    • Download Options
    • Trade-In Program
    • Competitor Worksheet
  • FlowPro
  • Replicator

Support

  • NetFlow, IPFIX & sFlow Configuration Guide
  • Available Scrutinizer Updates
  • End of Life Policy
  • Scrutinizer Manual
  • FlowPro Manual
  • Replicator Manual
  • FAQ
  • Services

Resources

  • White Papers
  • Case Studies
  • Webinars
  • Forensic Investigation Kit
  • Free Book Compliments of Plixer!

Partners

  • Find a Partner
  • Become A Partner
  • Partner Login
  • Technology Alliance Partners
  • Cisco Systems
  • Citrix Systems
  • Endace
  • Gigamon
  • Ixia
  • Paessler – PRTG
  • Palo Alto Networks
  • VMware
  • Splunk

About

  • Company Overview
  • Awards
  • Our Culture
  • Careers
  • Our Customers
  • Community Outreach
  • Press Releases
  • In The News

© 2019 Copyright Plixer, LLC. All Rights Reserved. Terms and Conditions | Privacy Policy