All
elgin

Support criteria for SD-WAN vendors

As OEMs continue to invest in WAN optimization, what differentiates vendors’ capabilities so that enterprises seek to scale their infrastructure? In this blog, we’ve...

jake

Slickwraps breach and metadata analysis

In a new series of blogs, we will go over some recent data breaches and how metadata analysis could have helped with the detection...

briand

Top five VPN monitoring use cases

With the dramatic shift to work from home, Plixer has been working with people all over the globe to visualize VPN traffic in a...

scottr

Troubleshooting NetFlow over VPN tunnel

I was working with a customer last week who had configured NetFlow on four of their Cisco routers. They had applied basically the same...

jimd

Are you looking for an easier way to see how your VPNs are being used on your network? Here’s how to do it.

Who has the time, right? You might laugh but the truth is, in the past few weeks you have become the guru of everything...

cybersecurity roundup Q

A “cursed” domain, a biodata bill of rights, and more: Q1 ’20 cybersecurity roundup

In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and...

joanna

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies...