All
adam

Integrating Threat Intelligence with Flow Data

Threat intelligence feeds help us keep our networks secure and our engineers informed on the latest issues. Huge volumes of this data get published...

jimd

More on Endpoint Visibility: Mobile Security and Your Network Security Strategy

Why should your endpoints be an important part of your network security strategy? Because even though they are out in the wild, endpoints are...

How to detect SSH credential misuse with network traffic analytics

According to a recent article on BleepingComputer, a backdoor Python library can steal SSH credentials. This can lead to ssh credential misuse if undetected by IT...

jeffm

ISPs and Netflix Open Connect

Whether it’s after a long day at work, a rainy weekend, or when a new season of your favorite TV show is released, we’ve...

mikep

Cisco IWAN vs. Viptela

While investigating our SD-WAN value proposition with customers, I worked with one client who has Cisco IWAN for 250 branches uses Scrutinizer to monitor...

traci

Scrutinizer Installation Guide

I’ve recently had a couple of people reach out to me about the deployment process of our Scrutinizer Virtual Appliance (VA). I wanted to...

bobn

5 Lessons Learned at RSA 2018

Last week I traveled with the Plixer team to San Francisco for the RSA 2018 Conference. The show was bigger than ever, with nearly...

insider threats employees

How to Mitigate Insider Threats with Network Traffic Analytics

According to a recent Ponemon Institute report, the cost of insider-related breaches has escalated to over $8.7 million. What’s even more concerning is that...

joanna

NetFlow Configuration Guide: Best Practices

One of the things I do daily with customers is help them configure NetFlow on their network devices. Often as I’m going through my...