Flowmon

Brno, Czech Republic
2007
  |  By Filip Cerny
There is no escaping the discussion about how machine learning (ML) and AI systems will revolutionize how people and industries work. Most of this discussion needs to be revised, as companies are still evaluating how AI systems (typically Large Language Model (LLM) systems like OpenAI ChatGPT, Google Gemini, Anthropic Claude and others) enhance worker productivity and deliver business benefits. Cybersecurity is one sector where extensive use of AI-enhanced solutions is common.
  |  By Filip Cerny
Progress Flowmon 12.4 addresses the challenges in understanding the need for faster and more efficient data analysis. At Progress, our primary focus is to provide accurate and thorough network data insights to our customers. As our customers' networks grow, the volume of telemetry data expands exponentially. This growth, while beneficial, brings with it the challenge of increasingly longer search times through vast amounts of data.
  |  By Martin Škoda
In today’s rapidly evolving cyberthreat landscape, organizations require network detection solutions that help identify and mitigate threats before significant damage happens. Among the options available on the Network Detection and Response (NDR) market, Progress Flowmon Anomaly Detection System (ADS) stands out for its unparalleled ability to detect threats throughout every stage of an attack.
  |  By Filip Cerny
This blog explores each acronym for those hearing them for the first time and for professionals who’d like to brush up on them.
  |  By Nick Vlasov
Artificial intelligence (AI) is seemingly everywhere in today’s tech landscape. The hype cycle is in full flow, especially regarding the use of large language models (LLM) for generative AI like OpenAI ChatGPT, Google Gemini and Anthropic Claude. Indeed, many tech companies are determined to add LLM into products where it sometimes seems tacked on.
  |  By Filip Cerny
IT professionals seek out solutions that provide in-depth visibility into their networks and streamline processes so they can more efficiently catch anomalies. A recent update to Progress Flowmon Anomaly Detection System (ADS) will address these concerns our customers have. This blog gives you the first look into how Flowmon ADS 12.3 improves your organization’s threat analyses and cybersecurity strategies.
  |  By Nick Vlasov
The new partnership between Progress and Veeam represents a significant step forward in cybersecurity. It marks a considerable advancement in data protection by merging the Flowmon AI-powered threat detection capabilities with the robust backup solution of Veeam. This empowers organizations to more effectively defend their invaluable digital assets.
  |  By Robert Balzer
Progress Flowmon is a core network monitoring and security tool. Confirming if it is up and running can mean the difference between responding to a data breach or overlooking such a critical event. Like any other critical system, it is a good practice to include the monitoring of Flowmon uptime, resource consumption and health in an IT infrastructure monitoring (ITIM) dashboard, such as Progress WhatsUp Gold.
  |  By Artur Kane
AI-powered Network Detection and Response (NDR) solutions have become a staple for identifying the subtle indicators of unknown threats, a crucial element in the constant battle against cyberattacks. While NDR excels in unveiling the shadows of the unfamiliar, it is the traditional signature-based Intrusion Detection Systems (IDS) enabling security teams to maximize protection and facilitate targeted responses, particularly when confronting well-known malware.
  |  By Filip Cerny
Endpoint protection has long been fundamental to cybersecurity. But in today’s evolving and expanding digital landscape, with endpoints spanning a wide variety of devices, is traditional endpoint security enough? The ongoing frequency of successful cyberattacks suggests not. Cloud proliferation, remote work and expanding system access add to the challenge. Can you truly trust users to keep their devices secure amidst this shifting landscape?
  |  By Flowmon
In this video, we explore the latest ransomware trends and how your security team can stay one step ahead of cybercriminals with advanced ransomware detection solutions like Progress Flowmon. Our cybersecurity experts discuss critical topics, including: Don't miss this opportunity to gain insights and practical tips to strengthen your organization’s ransomware defenses.
  |  By Flowmon
In this webinar, we will demonstrate the powerful capabilities of Flowmon, focusing on: Watch now!
  |  By Flowmon
In this video, we'll demonstrate Flowmon Collector Demo capabilities.
  |  By Flowmon
In this video we'll demonstrate the capabilities of Flowmon Anomaly Detection System with a use case.
  |  By Flowmon
Our experts will demonstrate these new features live, showing how Flowmon 12.4 can improve your network security and monitoring. Learn how Flowmon 12.4 can benefit your organization’s security efforts by seeing it in action!
  |  By Flowmon
Supply chain attacks impact both individual suppliers and their customers' organizations. Detecting and mitigating these attacks early is crucial to help prevent data breaches, operational disruptions and reputational damage. Fortunately, with the right tools, you can detect traces left behind by the attackers.
  |  By Flowmon
Introduction of Flowmon Application for seamless integration of Flowmon with IBM QRadar.
  |  By Flowmon
Network traffic analysis is crucial for maintaining the health and security of your network infrastructure. However, addressing challenging issues related to packet capture and analysis can be daunting, especially if you lack deep knowledge of network protocols. This webinar is designed to help you overcome these challenges with the powerful capabilities of Flowmon.
  |  By Flowmon
Our webinar, Network Detection Response (NDR) Explained will unravel the complexities of this technology and highlight its critical importance in today's cybersecurity landscape. Progress Flowmon product experts will guide you through the historical evolution of NDR technologies. Additionally, you will learn how NDR.
  |  By Flowmon
Your CISO’s top priority is to fortify your organization's security posture by closing vulnerabilities, disrupting attack chains and bolstering defenses. Yet, the challenge lies in harmonizing disparate security solutions across your organization’s network to develop a unified and proactive defense strategy.
  |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
  |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
  |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
  |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.