All

3 cybersecurity trends to watch

Businesses are seeing a 50% increase in cyberattacks per week. That’s according to a report from Check Point Research, where companies reported a bump in...

ralph hutter vuIBWXCIRo unsplash

5 NDR best practices

Threats today continue to endanger the security of the enterprise at an alarming rate. In fact, a recent report by Positive Technologies found that cybercriminals...

hunter harritt YpesdOPdYc unsplash

Gain observability by replicating network data streams

The need for more telemetry data is real.  The word observability is being used quite a bit nowadays. I see it being used in...

Leveraging MITRE ATT&CK® and incident correlation to improve incident investigations

Increasingly complex cyber threats are pushing SOC analysts to ‘up their game’.  It has become critical to quickly understand how an attacker has gained access,...

3 lessons energy and utility cyberattacks have taught

Recent attacks indicate that energy and utility companies need to increase their security posture sooner rather than later. Because energy companies are so entwined...

Machine learning takes the guesswork out of network capacity planning

It likely will come as no surprise that the machine learning (ML) market is expected to experience a compound annual growth rate of almost 40...

Why analyzing network flow data helps network performance

When we talk about Plixer’s Network Performance Monitoring and Diagnostic (NPMD) platform, one of the key features that we highlight is that our solutions use...

Network intelligence with machine learning

Whether you’re monitoring an enterprise network for performance or security, you need a tool to help collect and process data. Data is good to...

Why you shouldn’t rely on packet analysis for threat detection

If you’re familiar with Plixer’s solutions, you’ve likely noticed that one of our main competitive differentiators is that our solutions don’t depend on packets but...