Simply put, network analytics is the practice of using different types of network data to identify trends and patterns. Then, that information is used to make better decisions—troubleshooting decisions, threat remediation decisions, business planning … [Read more...] about Network Analytics: What It Is, How It’s Used, and Who Benefits the Most
In the IT space we are not new to challenges. Some might even say we welcome them and thrive in overcoming hurdles. Each and every department in our IT infrastructure faces their own unique challenges every day. Today I wanted to explore one challenge in … [Read more...] about NetOps and SecOps Collaboration Solves the Data Silo Problem
Here at Plixer, we often handle confusion from new customers as to what 95th percentile billing is and how it works. Since it is such a prevalent method, I could not miss an opportunity to explain the math behind it and provide insight into 95th percentile … [Read more...] about How does 95th percentile billing work?
The recent SANs 2018 Survey on Endpoint Protection and Response makes clear that point-security solutions are not enough to quell the ever-growing barrage of cyberattacks. The survey polled 277 IT professionals on endpoint security concerns and practices. In … [Read more...] about Endpoint protection isn’t enough: you need network traffic analytics
Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud over the last few years, and for good reason. The cost-saving benefit, ease of administration and space reduction are all good reasons to move your internal … [Read more...] about Scrutinizer SaaS Deployment
In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with our solution to correlate events with syslogs, DNS, IPAM, and cloud infrastructure logs. This blog will go a bit deeper on … [Read more...] about Best Practices in Network Forensics, Part II: Insider Threats
With the recent news of security vulnerabilities in the Intel Active Management Technology, now seemed to be the best time to share how security and network professionals can monitor Intel AMT traffic using their existing flow and metadata collector. In this … [Read more...] about How to monitor Intel AMT traffic
Network Maps provide end-users with a high-level view of what their network topology looks like, as well as how traffic is flowing through your network. Most commonly, I see them used as a quick reference to determine if there’s any link saturation happening. … [Read more...] about Creating a Network Map
There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the days where we asked incessant strings of questions before our tired parents got us to stop. “Why, why, why?" This mindset helps answer … [Read more...] about Asking the Hard Questions: Why Analyze Network Traffic?
I feel comfortable saying that all of us know what encrypted data is. Web encryption, specifically, has been around for quite some time now. Secure Socket Layer (SSL) did take a long time to be considered widely adopted, however—twenty-two years, to be exact! … [Read more...] about Tracking Malware Hidden in Encrypted Traffic