All Uncategorized

Navigating the Unique Challenges of Education Cybersecurity

How do you maintain an environment that is both open and secure? Many professionals who work in education cybersecurity have to answer this question,...

Data Breaches in Education: Information Security and Educational Institutions (Part 2)

The first blog in this series discussed the importance of including information security in the strategic planning of any educational institution. In today’s blog...

What you need to know about 23 NYCRR 500

Near the end of last year, Financial Services Superintendent Maria T. Vullo announced that the New York State Department of Financial Services (DFS) had...

bob

Big Data Security Analytics

For the last few decades, security teams have taken a “point product” and best-of-breed approach to securing their environments.  Although historically this approach has...

Bolstering Bank Security

Back in April of this year, the Swift international money transfer network which connects 11,000 global banks in over 200 countries was used to...

jenn feature

Information Security and Educational Institutions

The Plixer team recently had the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim, California. Over the course of the show we...

Student Retention and Enhancing the Learning Experience

I was recently given the opportunity to attend the 2016 EDUCAUSE Annual Conference in Anaheim California as part of the Plixer team.  For those...

Wireless Network Visibility using NetFlow

These days wireless network visibility using NetFlow is helping network administrators manage network application performance by giving them insight into wireless policies that prioritize...

NetFlow Deduplication or Flow Deduplication

The business of NetFlow Deduplication (aka Flow Deduplication) during collection time faces an interesting paradigm. It revolves around enterprise NetFlow collection and scalability. This...

NetFlow SaaS Offering

Finally, a secure NetFlow SaaS offering that is rich with analytics features while being highly scalable for distributed networks.  Although our system was easily...