All Network Traffic Analysis
A picture of a cartoon courthouse looking dark and gloomy surrounded by locks meant to depict a cyber attack.

Navigating the Rising Tide of Stealth Cyber Threats: A 2024 Perspective

As we navigate through 2024, the cybersecurity landscape is increasingly dominated by stealth and sophistication. The recent CrowdStrike Global Threat Report highlights a dramatic...

Plixer One dashboard showing alarms related to user/entity behavior

Enhancing Security with Behavior Analytics   

User and Entity Behavior Analytics (UEBA) provides the critical insights needed to identify these hidden dangers by monitoring behavioral patterns across users and entities,...

briand

Where should I enable flow data?

The big boss had a conference call over the weekend. She sent a message to your boss’s boss, which trickled downhill, and eventually made...

briand

How to Filter Network Traffic

When it comes to filtering network traffic, a scenario that appears simple in nature can be hard to accomplish at scale. Understanding top talker...

critical thinking

Asking the Hard Questions: Why Analyze Network Traffic?

There are times when we adults would be better off thinking like toddlers. More specifically, I want us all to go back to the...

Linux NetFlow Collector

So you are thinking of delving into the world of Linux NetFlow Collectors, but do not quite know where to begin. Well we would...

VMware IPFIX Support

VMware IPFIX support and our IPFIX collector, Scrutinizer, give you visibility into the ‘cloud’. In this blog, I will show an example of a...

Internet Threats: UDP Scans

Let’s talk about UDP scans and how they can be an internet threat. In today’s world, having multiple layers of Internet Threat Defense is...

Banking Internet Security

Now more than ever banking Internet security is at the forefront of nearly every CIO, CTO and Director of IT employed by a financial...

Xirrus IPFIX Support

Xirrus IPFIX support provides network admins greater insight into what is going on out at the edge. Understanding which devices are creating the most...