All
jimd

Enhance NetOps/SecOps collaboration with Plixer’s new collections feature

I can’t tell you how many calls I’ve been on where the NetOps and SecOps teams really don’t know what the other is doing....

elgin

How to detect bogon connections

Many ISPs filter bogon connections because bogon IP addresses have no legitimate use. If you find a bogon or bogus IP address in your...

We’ve released our biggest update ever, plus two new products

One year ago, we announced our new vision. That is, we believe that SecOps and NetOps provide value for each other, and that value...

jake

Detecting IP spoofing with Plixer Scrutinizer and Endpoint Analytics

A common tactic for bad actors to get a foothold into the network is to leverage IP spoofing to either: Regardless of the intention,...

briand

Advanced Silver Peak monitoring with IPFIX

Competition generally ends up being good for the consumer. It keeps prices down and forces innovation as vendors compete for market share. A great...

stephen

Home network quarantine project: Ubiquiti NetFlow

A few years back, Jake Bergeron, one of Plixer’s Sr. Solutions Engineers, wrote a blog about Ubiquiti NetFlow support and how to enable it....

scottr

How to avoid NetFlow sampling

As resource demands and bandwidth speeds in many of today’s network infrastructures continue to increase, many network administrators believe that NetFlow sampling is the only...

khalil

Nexus 5600 NetFlow configuration

In this blog, we’ll cover the NetFlow configuration for Nexus 5600 switches. To configure NetFlow, ensure you have a VRF (virtual routing and forwarding)...

jeffmonaco

An “A-list” ransomware attack

How safe is your personal information? Well, several celebrity clients of a New York law firm have discovered that it’s only as safe as...