All
mikel

Expanding Scrutinizer’s disk: how to add more storage to your deployment

So you have added storage to your fresh Scrutinizer deployment. Or you’re giving your existing Scrutinizer deployment extra space. If you add a second...

feature image

Flow protocols in real-world environments

Over the years, libraries have been filled on the topic of flow protocols—specifically, how they work and their general accuracy....

Plixer a fresh perspective

Plixer—a fresh perspective

2019 marks Plixer’s 20th year providing network analytics solutions to IT teams all over the world. Today we’re launching a new identity....

jimd

Three Ways to Comply with GDPR

The requirements of GDPR can be vague sometimes. I have had quite a few of my customers ask how we help companies with questions about GDPR...

jeff

Scrutinizer and Its RESTful API

I spend a large amount of time day-to-day working with customers to understand how they can best leverage their current NetFlow/IPFIX data to solve...

elgin

Why is Metadata Important for IT Compliance?

Enterprises are seeking proactive approaches against potential breaches in their network and prefer passive approaches to detect vulnerabilities. But as technology evolves and become...

joanna

How to Protect Your Network Against the ‘Sea Turtle’ DNS Hijacking Campaign

A large-scale DNS hijacking campaign called ‘Sea Turtle’ has been spreading across more than 13 countries. With our FlowPro Defender, you can monitor your...

Virtualization Monitoring: How to Gain Visibility into Your Virtual Environment

Virtualization offers many benefits to organizations. But at the same time, you’ll have to figure out how to monitor your virtual environment, because a...

Protecting your network from IoT peer-to-peer vulnerabilities

In a recent article on Dark Reading, it was revealed that millions of IoT devices were exposed to a peer-to-peer (P2P) vulnerability. Given how...