Download Datasheet

Letter | A4

Download Configuration Guide

How to integrate Network History with Plixer Scrutinizer

Letter | A4

More Information

For more information about Plixer contact us.

Contact Us


Plixer’s Scrutinizer flow based analyzer provides deep insight into user, application and network device behaviour improving network and security operations team real-time situational awareness. The built-in Flow Analytics™ performs behavioral analysis on collected flows to identify suspicious behaviour on the network, such as machines compromised by malware “phoning home” to C&C servers. Using a calculated threat index, Scrutinizer reduces false positives and is able to rapidly differentiate between compromised systems and misconfigured devices, allowing for measured, timely and prioritized response measures.

Complementing the broad visibility offered by Scrutinizer, EndaceProbes deployed across the network capture, record and index 100% of the raw traffic data that is also the source for flow records. This indelible packet history records provides forensic evidence of compromise and raw packet data for deep analysis in tools like Wireshark.

Using the Endace Fusion Pivot to Packets technology, Scrutinizer users can pivot from an event of interest directly to the packets, which can be retrieved from the EndaceProbes seamlessly from within the Scrutinizer UI. This increases the speed with which analysts can drill down into packet level data during live investigation, and simplifies the archival of packet data for subsequent analysis. By streamlining this workflow, analysts can investigate events and alerts more efficiently, improving response time and decreasing time to resolution.


  • Lower OPEX and faster time-to-resolution (TTR) for network and security incidents through streamlined workflow
  • Broad real-time flow visibility and analytics complemented by deep back-in-time packet history
  • Packet-level forensic visibility for breach analysis