Navigating the Unique Challenges of Education Cybersecurity
How do you maintain an environment that is both open and secure? Many professionals who work in education cybersecurity have to answer this question,...
How do you maintain an environment that is both open and secure? Many professionals who work in education cybersecurity have to answer this question,...
The first blog in this series discussed the importance of including information security in the strategic planning of any educational institution. In today’s blog...
Near the end of last year, Financial Services Superintendent Maria T. Vullo announced that the New York State Department of Financial Services (DFS) had...
For the last few decades, security teams have taken a “point product” and best-of-breed approach to securing their environments. Although historically this approach has...
Back in April of this year, the Swift international money transfer network which connects 11,000 global banks in over 200 countries was used to...
The Plixer team recently had the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim, California. Over the course of the show we...
I was recently given the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim California as part of the Plixer team. For those...
These days wireless network visibility using NetFlow is helping network administrators manage network application performance by giving them insight into wireless policies that prioritize...
The business of NetFlow Deduplication (aka Flow Deduplication) during collection time faces an interesting paradigm. It revolves around enterprise NetFlow collection and scalability. This...
Finally, a secure NetFlow SaaS offering that is rich with analytics features while being highly scalable for distributed networks. Although our system was easily...