All
scottr

Detect abnormal lateral network traffic using machine learning and NetFlow

In a previous blog I introduced you to the malware detection capabilities of Plixer’s intelligence product. I would like to circle back to some...

dylan

Client and server reports in Plixer Scrutinizer

In our new release of Scrutinizer version 19.1.0, we have included a handful of new reports that help to provide more information on the...

Searching NetFlow for a private host behind a NAT router

Inbound traffic that is captured and exported as NetFlow by your NAT router only shows that the destination of the inbound internet traffic is...

khalil

Configuring sFlow on Arista devices

Today I want to show you how to configure sFlow on your Arista device and demonstrate its featured output through Plixer Scrutinizer. Our goal...

joanna

Malicious links and how to find them

It can happen to anyone, even the most seasoned of network security personnel. You can be searching for something on Google, see a seemingly...

scottr

Cisco Firepower FTD NetFlow configuration

I am often exposed to new network devices and the ways that they support and configure flow-monitoring technologies. So I was excited to learn...

dylan

Tuning DDoS and DRDoS flow analytics to your environment

As more and more devices are added to the internet, a larger swath of insecurity comes with them. Botnets and compromised devices are the...