Welcome!

Websphere Authors: Yeshim Deniz, Roger Strukhoff, Liz McMillan, Rajiv V. Joshi, Bruce W. McGaughy

News Feed Item

Plixer Enhances Award-Winning Network Threat Detection Solution

Scrutinizer v12 Protection Scales to Monitor Limitless Network Data Flows Per Second

SAN FRANCISCO, CA -- (Marketwired) -- 05/19/14 -- Today at Cisco Live, Cisco's annual IT and communications conference, Plixer International, a leader in insider cyber threat detection and forensics today, released Scrutinizer v12 with support for distributed flow collection with a central interface for cyber threat detection and investigating suspicious behaviors. With each independent collector capable of up to 200,000 flows per second operating under the umbrella of the distributed architecture, the Scrutinizer appliance can support over four million flows per second. Plixer is demonstrating v12 at Cisco Live booth number 2005.

"This is a solution that scales to meet the needs of large enterprises," said Marc Bilodeau, Founder of Plixer. "The new architecture performs forensic analysis across collectors to uncover insider threats engaged in reconnaissance efforts with botnets. We've also included a unique baseline capability that allows our customers to baseline absolutely anything that is being collected. Our customers will find it effective at assisting their efforts to uncover internal contagions that have snuck past other DPI security appliances."

The central interface of the solution ensures that policies and configuration updates are pushed down to the potentially dozens of flow collection servers. The interface provides the ability to trouble shoot enterprise problems that stretch across the ocean with multiple collection points all from a single web console. Security Admins can pin point threats from a single location without jumping from one collector to another to run the same search.

"The nature of this unique distributed architecture results in collectors responding to a reporting query only if they have data matching the criteria," said Erik Peterson, Director of Engineering at Plixer. "Even when all collectors have matching data, the local crunching and aggregation of the data before transport results in minimal overhead on the network. In our tests the architecture seems to scale without limits and is ready for our largest customers."

Cyber Defense Magazine named Plixer's Scrutinizer appliance the "Editor's Choice - Forensics Solution" within its 2014 Cyber Defense Awards announced at this year's RSA Conference in San Francisco. The Scrutinizer appliance was recognized for its innovation in the collection and reporting of NetFlow, IPFIX, sFlow and related flow technologies, as well as the use of these technologies for threat detection and forensic evidence gathering.

To schedule a live demo, call (207) 324-8805 or email at sales@plixer.com. For more flow technology insight, follow Plixer International on their Blog, Twitter, Facebook or join NetFlow Developments Group on LinkedIn. To learn about these new features, register for an Advanced NetFlow Training classes offered by Plixer nationwide.

About Plixer

Plixer International, Inc. is a leading threat detection and forensic evidence provider focused at engineering the very best system for uncovering unwanted communication behaviors. Rather than depending on packet signatures, their strategy uncovers unwanted communications by leveraging NetFlow, IPFIX, sFlow and other derivatives. The company was built by network and system engineers who understand the need for scalable distributed collection solutions that meet the dynamic demands of security and network professionals. Customers include CNN, The Coca-Cola Company, Lockheed Martin, IBM, Regal Cinemas, Raytheon, and Eddie Bauer.

Press Contact:
Betsey Rogers
BridgeView Marketing for Plixer
betsey@bridgeviewmarketing.com
U.S. +1 603-886-7087

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.