All Network Operations
bobn

As SD-WAN Replaces Branch Routing, End-to-End Visibility Gains Importance

SD-WAN is gaining tremendous traction as more and more organizations deploy it to replace traditional branch routers. The two biggest reasons for this are...

How does 95th percentile billing work?

Here at Plixer, we often handle confusion from new customers as to what 95th percentile billing is and how it works. Since it is...

scottr sd wan

Monitoring SD-WAN Traffic with NetFlow

Many businesses have, or are thinking about replacing their MPLS network infrastructure with Software-Defined Wide Area Networks (SD-WAN). They want more flexible, open, cloud-based,...

adam

How to Prevent NetFlow Export Storms

When measuring NetFlow volume, we typically speak in thousands of flows per second. That data is exported over UDP from the network infrastructure to...

endpoint protection FI

Endpoint protection isn’t enough: you need network traffic analytics

The recent SANs 2018 Survey on Endpoint Protection and Response makes clear that point-security solutions are not enough to quell the ever-growing barrage of...

mikelp feature

Clearing the Mine Field: Scrutinizer & Lansweeper for Network Monitoring

Greetings fellow sysadmins. Either you’re reading this because you’ve just installed Lansweeper too, or else you’re wondering “What is Lansweeper? Is it the Linux...

jeff

Scrutinizer SaaS Deployment

Let’s talk about the cloud for a minute. A majority of IT infrastructure has been moving to the cloud over the last few years,...

traci

Extreme Networks: Enabling and Disabling SNMPv1, SNMPv2, and SNMPv3

Why am I seeing SNMPv1 and SNMPv2 attempts when I’ve only got SNMPv3 enabled? It appears some of Extreme’s switches handle their SNMP configurations...

context

Network Traffic Analytics with Gigamon

Quite some time ago, my colleague wrote about our Gigamon NetFlow support. That article will help you understand how to configure your Gigamon appliances...

jake

Best Practices in Network Forensics, Part II: Insider Threats

In part 1 of our Best Practices in Network Forensics we discussed different integrations and how you can tie in your existing tools with...