Amazon: AWS Log Reporting

I was having a conversation with a customer the other day about Amazon AWS monitoring.  He had some interesting insight on his company’s overall migration to Amazon Web Service (AWS). He started with, “Here’s the core of it, cloud based deployment isn’t going away for us. Though there are no directives, by this time next year I’m expecting all but two of our public-facing applications to be sitting outside of our buildings.”  He even went on to say, “There’s a very real possibility that within 2-3 years we decommission half of our computer rooms”. Needless to say, any application that they use for network visibility and incident response needs to support Amazon AWS monitoring. I loved his input and because of it I decided to dig deeper. Continue reading “Amazon: AWS Log Reporting”


Free Virtual NetFlow Collector

A good number of evaluators have been asking me what’s the best way to evaluate our free virtual Netflow collector. There is a growing trend of companies moving away from dedicated hardware to a virtualized environment. However, there are many options to create such a network. Windows has Hyper-V, which is part of the Windows Server OS, VMware has ESXi to, and KVM  meet these virtualization needs. Plixer supports all three of these virtual environments with our Free virtual NetFlow collector, Scrutinizer. Installation of our solution is as simple as deploying the appropriate package to the specific hypervisor.

Continue reading “Free Virtual NetFlow Collector”

What’s the difference between Information Security and Cyber Security? — Daniel Vizcayno’s Insights

Few years back, I was presenting my three year Information and Cyber Security Program, to my surprise – not all Information Technology (IT) executive understood Information Security (INFOSEC), much more Cyber Security (CYBERSEC). What are the possible relations between these two fields of security?. What is INFOSEC? Let’s find out the definition from widely accepted international […]

via What’s the difference between Information Security and Cyber Security? — Daniel Vizcayno’s Insights

Attack Investigation and Recovery

Are you building an incident response system? Does it include tools that allow for attack investigation and recovery? Earlier this year I wrote a three part series on constructing a Cyber Incident Response Plan and outlined two ways Scrutinizer can be an important part of this endeavor. After reading the latest BBC article on how Website-crippling cyber-attacks are to rise in 2016 , I figured that I would talk a bit more on how our Flow Analytic intelligence can assist with attack investigation and recovery.

Continue reading “Attack Investigation and Recovery”

Cyber Incident Response Plan (Part 3)

Every day we see more and more stories about security breaches across the globe. With there being so many new cyber security threats coming out the need for traffic analysis Cyber Incident Response plan need in the newsand a strong CyberIncident Response plan has never been so high. In part one and part two of this series, we demonstrated that by combining NetFlow/IPFIX technology with Scrutinizer you are getting 100% network visibility. Here in part three of this series, we are going to talk about the importance of adding Scrutinizers Flow Analytic’s Intelligence into your cyber incident response plan to detect network traffic anomalies.

Continue reading “Cyber Incident Response Plan (Part 3)”

Cyber Incident Response Plan (Part 1)

The value of your cyber incident response plan becomes stronger as various global incidents unfold.  Just today, I was going through my news feeds and came across a post titled “Cybersecurity: Defending ‘unpreventable’ cyber attacks” by Paul Rubens from BBC News and one word stood out, “Vigilance”.

Continue reading “Cyber Incident Response Plan (Part 1)”