As a Presales Engineer, I spend a good portion of my time helping with Scrutinizer installs and helping troubleshoot unique use cases for end users. In my 7 years of doing this, I’ve noticed a lot of commonality between installs even in disparate environments. I hope to add more to this list as time goes on and trends in the industry evolve further.Read more
We’ve reached our last roundup post of the year (and the decade!). This quarter’s interesting articles included yet another example of tech meant to protect children endangering them instead; how we’ve all trained AI for years without realizing it; a truly bizarre solution for poor user-chosen passwords, and more.Read more
Questions regarding deduplicated NetFlow often come up when beginning to research NetFlow solutions. This blog will address some of the reasons why deduplication might not be the best way to go.Read more
The Internet of Things (IoT) market is booming. Gartner predicts that 5.8 billion IoT endpoints will be in use in 2020, marking a year-over-year growth rate of over 20% since 2016. While IoT devices undoubtedly make life more convenient, they also present an expanding attack surface as a means of network infiltration. Recent reports suggest that IoT devices have become a primary target with attacks on IoT devices up 300% in the first half of 2019. Given these developments, IoT security has become a hot topic.Read more
If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins and outs of this framework, including why it’s crucial to modern networks and the best practices to implement and maintain it.Read more
Are you ready for the end?
January 2020 it will come to an end.
We all knew it was coming. But what now?
Servers that you don’t want to pay expensive licensing to upgrade… Workstations that are still good but Windows 10 is just too heavy for them… What do you do?Read more
If you use Cisco’s wireless solutions or Aruba Wireless, you already know how important impression tracking is. There are some strong IPFIX elements that Plixer supports for both platforms and one of the benefits becomes correlation of that data with other systems in the network. Jeff Morrison, one of the other engineers here at Plixer, discussed this in his blog last week and I would suggest reading that first.Read more
So far we have used the Scrutinizer API to build a dataset that tells us how many hits our top ten countries are getting. Next, we’ll explore how easy it is to use this data to populate an open source digital heat/attack map.Read more
I’m often asked, “if I already have a solution to monitor this segment of the network, why do I need a solution that will overlap”? It’s a very fair question to ask, considering in most aspects of life redundancy or overlap isn’t necessarily considered good. In the case of network monitoring, I would argue overlap isn’t bad if it’s also providing correlation. With that in mind, I wanted to focus on the benefit of monitoring your wireless network traffic, and specifically having the ability to correlate this traffic across the entirety of your network.Read more