Featured Entries
Security Brief: MOVEit Vulnerability
Exploits of vulnerabilities present in the file transfer system MOVEit have been all over the news. But what is it and what can you...
::5 NetFlow Myths Debunked webinar
Is NetFlow useful for security analysis? Can NetFlow analysis detect sophisticated threats? How does it compare to full packet capture data? Discover the answers...
::Plixer Enterprise Platform Data Sheet
Discover the immense value and capabilities of Plixer Enterprise Platform. This datasheet covers how Plixer harnesses your existing infrastructure to provide wide visibility with...
::Plixer Core Platform Data Sheet
Take control of your network with Plixer Core Platform. In this datasheet, learn how to harness your existing infrastructure to provide comprehensive network monitoring...
::Endpoint Visibility Gap
Despite significant progress in cybersecurity, endpoints remain a persistent concern for security professionals worldwide. Gaining visibility into and understanding endpoint activity can significantly mitigate...
::5 NetFlow myths debunked
See how NetFlow provides a powerful data set for threat detection, investigation, and response. Many people still misunderstand the richness of network flow data....
::How to comply with the NIS2 Directive
See how Plixer helps you achieve NIS2 compliance. In this white paper, you’ll learn what the NIS2 Directive means to your organization and how...
::Benefits of machine learning for network capacity planning and forecasting
IT environments are highly decentralized, abstracted, and dynamic in ways that power business innovation but challenge your ability to manage and protect those environments....
::Plixer and SOAR integration
Security Orchestration, Automation, and Response (SOAR) is a vital tool for modern-day networking environments, and its usage is becoming increasingly common. SOAR platforms enable...
::