All
jeffl

Network Detection and Response as an investment: How to calculate the value

This is the final post in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How...

jeffl

Containing a cyberattack: How NDR strengthens your response

This is part 3 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to use NDR as a radar...

jeffl

Why network metadata analysis is the best initial action to inform security teams

This is part 2 in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. Be sure to check out part 1, How to...

jeffl

How to use NDR as a radar system for your network

This is the first in a 4-part series of articles by Plixer’s CEO, Jeff Lindholm. In the warmer months here in New England, you...

justin scaled

Using flow-based NDR to fight ransomware

Ransomware is everywhere and cybercriminals are increasingly more antagonistic, demanding ever increasing ransom payments. Palo Alto Networks’ Unit 42 says that payments are up...

georgem

The changing needs of network performance monitoring

Recently, I was asked by one of our long-time customers whether Plixer had abandoned its traditional Network Performance Monitoring & Diagnostics (NPMD) and Network...

theresa

Enterprises face tough, new reality of cybercrime: It’s not if, but when

By 2025, it’s estimated that cybercrime will cost the world $10.5 trillion annually—a figure that includes damage and destruction of data; theft of intellectual...

scottr

Network security: How effective is your security posture?

Network security is described as the implementation of technologies, processes, and protocols designed to safeguard an organization’s communications and information....

adamb

The 7 best Network Detection and Response use cases

Hallmarked by the application of machine learning to network metadata, Network Detection and Response leverages advanced intelligence and integrations with response-capable solutions such as...