Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Plixer NPMD Popular

Device discovery

Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on your network, device locations, and behavior in real-time. Validate enterprise software license agreements and ensure contract compliance and audit readiness.

Device profiling

The Plixer NPMD platform collects and analyzes contextual data from a wide variety of sources, including DNS, DHCP, SNMP polling, SNMP traps, NetFlow/J-Flow/sFlow, Active Directory, RADIUS Accounting, and port mirroring. It then categorizes devices using thousands of predefined device profiles, reducing dependence upon manually intensive, time-consuming processes, which then frees staff to focus on core business tasks.

Risk assessment

Gauge your enterprise’s overall endpoint risk with a concise, aggregated score. The Plixer NPMD platform calculates a summary risk score and breaks out vulnerabilities into four distinct categories: operating-system-related risks, device-related risks (profile identity), communications-related risks, and risks identified by external endpoint management/security solutions (integration).

Application performance monitoring

Network and application optimizations and root cause analysis require true end-to-end visibility. The Plixer NPMD platform monitors application performance by collecting, visualizing, and reporting on data that extends all the way from the user to the cloud. It also provides real-time detection of DDoS attacks, minimizing disruption and loss of revenue.

Contextual data to identify root cause

Through visualization of every conversation from Layers 2-7, the Plixer NPMD platform then correlates network-related data with metadata collected from firewalls, IDS/IPS, SIEM, and distributed probes. Better context is achieved by correlating traffic flows and the metadata collected from all corners of the network into a single database. You can then instantly identify the user, device, location, protocol, and application data for every flow on the network, making it easy to pinpoint the root cause of any issue.

Faster time-to-resolution

Rapid root cause analysis of issues causing poor user experience requires a combination of end-to-end visibility and easy-to-read reports on important data elements. Fast problem resolution requires you to easily correlate a user’s traffic with jitter, latency, and QoS misconfi

Rating
0 vote
Favoured:
0

Listing Details

Vendor
Plixer LLC
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-08-24
Owner
michelemjordan
Created
2022-08-24
  • 1479.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
  • Network Anomoly Detection +
  • Scanning Products +
    • - Network Enumerators
    • - Passive Fingerprinters
    • - Active Fingerprinters
    • - Vulnerability Exploitation
    • - Network Mapping
    • - Distributed Scanners
    • - Host Scanners
    • - Website Scanners +
    • - Database Scanners
    • - Wardialers
    • - Wireless Tools
    • - Bluetooth Scanners
    • - Network Scanners
    • - Vulnerability Management
    • - Compliance +
    • - Mobile Device Scanners
    • - Pen-Testing Distros
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message