Detect abnormal lateral network traffic using machine learning and NetFlow
In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...
In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...
It can happen to anyone, even the most seasoned of network security personnel. You can be searching for something on Google, see a seemingly...
As more and more devices are added to the internet, a larger swath of insecurity comes with them. Botnets and compromised devices are the...
When we hear about a cyberattack these days, there’s often a reference to when the network was originally compromised. In recent years, the need...
Last year Plixer released version 19 of Scrutinizer, and with it came the introduction of Plixer Security Intelligence, our machine learning appliance. The ML...
Imagine someone walks up to your desk and asks a very simple question: has this IP address been seen on our network? This could...
What is NDR? This blog will focus on the hottest 3-letter acronym of 2020 & 2021—NDR. Network Detection and Response solutions must address an...
Gartner just posted their worldwide spending forecast report for the first quarter of 2021 and it looks positive. Clearly, the experts will continue to...
The need to detect and mitigate denial-of-service attacks is nothing new to network and security administrators. DoS attacks on enterprise networks have been occurring...
Ping is one of those protocols that no one thinks about until it isn’t working and you’re trying to quickly troubleshoot connectivity between devices....
Looking for documentation? Visit our documentation site