All network visibility
AdobeStock

5 ways university networks need to shift in the post-pandemic world

It’s fall here on the east coast of the US and that means a few things. First is that the weather and leaves start...

jake

I installed Scrutinizer 100 times and here’s what I learned

As a Presales Engineer, I spend a good portion of my time helping with Scrutinizer installs and helping troubleshoot unique use cases for end...

endpoint security

Endpoint security explained: challenges and best practices for businesses

If you work on a corporate security team, endpoint security is an important framework to understand. After reading this blog, you’ll know the ins...

elgin feature

Why ERSPAN is Important for Network Security

Enterprises are seeking a secure monitoring solution that performs encapsulation. Encapsulated Remote SPAN (ERSPAN) identifies visibility gaps and vulnerabilities, but using it enables flow...

jake

Scrutinizer AMI Deployment Guide

Being on the pre-sales side of the house, I hear about a lot of upcoming projects for a variety of different companies and verticals....

jake

Configuring SolarWinds IPAM Integration

Part of my responsibility as a Sales Engineer at Plixer is to find new and exciting ways to integrate our tools with those that...

Context-aware security

According to Gartner, when it comes to context-aware security, the most commonly cited context types are location and time. However, there are multiple types...

Saisei IPFIX Support

Managing a network without having the necessary tools for visibility and control is similar to playing Russian roulette. You know a problem is going to...