All
jeffl

How to use NDR as a radar system for your network

This is the first in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. In the warmer months here in New England, you...

justin scaled

Using flow-based NDR to fight ransomware

Ransomware is everywhere and cybercriminals are increasingly more antagonistic, demanding ever increasing ransom payments. Palo Alto Networks’ Unit 42 says that payments are up...

georgem

The changing needs of network performance monitoring

Recently, I was asked by one of our long-time customers whether Plixer had abandoned its traditional Network Performance Monitoring & Diagnostics (NPMD) and Network...

theresa

Enterprises face tough, new reality of cybercrime: It’s not if, but when

By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual...

scottr

Network security: How effective is your security posture?

Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information....

adamb

The 7 best Network Detection and Response use cases

Hallmarked by the application of machine learning to network metadata, Network Detection and Response leverages advanced intelligence and integrations with response-capable solutions such as...

scottr

Detect abnormal lateral network traffic using machine learning and NetFlow

In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...

dylan

Client and server reports in Plixer Scrutinizer

In our new release of Scrutinizer version 19.1.0, we have included a handful of new reports that help to provide more information on the...

Searching NetFlow for a private host behind a NAT router

Inbound traffic that is captured and exported as NetFlow by your NAT router only shows that the destination of the inbound internet traffic is...