Brno, Czech Republic
Nov 29, 2022   |  By Pavel Minarik
Back in 2021 we have introduced the integration between MISP, a community threat intelligence sharing platform and Flowmon ADS. The integration turns indicators of compromise shared through MISP to actionable intelligence. Flowmon ADS will automatically pick up on latest indicators of compromise using MISP API and leverage those indicators of compromise to detect adversary activities in the target network. The integration is available in Flowmon ADS 11.2 and newer versions.
Nov 24, 2022   |  By Flowmon
Old network salts likely know all about network flows and the value of network flow monitoring. As former News Editor for Network World and Editor in Chief of Network Computing, network flows are part of my old stomping grounds. In fact, I remember when Cisco invented NetFlow in the late 1990’s to collect traffic data from its routers and switches so it could be analyzed by network pros.
Oct 5, 2022   |  By Flowmon
“Network behavior analysis (NBA) is a network monitoring program that ensures the security of a proprietary network. NBA helps in enhancing network safety by watching traffic and observing unusual activity and departures of a network operation,” explained Techopedia. “Network behavior analysis monitors the inside happenings of an active network by collecting data from many data points and devices to give a detailed offline analysis.
Oct 5, 2022   |  By Flowmon
There is no end to zero-day attacks. Lessen the pain by spotting them early. In recent days two zero-day vulnerabilities against Microsoft on-premises Exchange Servers have been publicized and exploited. The good news is that Exchange cloud users such as Microsoft 365 customers, need not worry as these exploits are only against the on-premises versions.
Sep 19, 2022   |  By Flowmon
Here in this blog, we will talk about some of the emerging ransomware you should know about and how you can prevent such attacks.
Sep 14, 2022   |  By Flowmon
The network is designed to connect the organization’s users, partners, customers and visitors, but those connections are useless without software. While applications run on internal servers, end points and the cloud, the performance of the network in large measure defines the performance of the application, and this performance is what user experience and application experience (AX) is based on.
Sep 5, 2022   |  By Flowmon
The reasons that cause applications to run slowly are many and varied. Narrowing down the cause behind any particular instance is time-consuming if the correct network monitoring tools are not in place. The delay in finding a root cause and fixing it always has a negative impact on users of the affected applications.
Aug 18, 2022   |  By Flowmon
Ransomware is the gift that keeps on giving. Old as it is (33 years) ransomware is constantly morphing into new exploits. The reason is simple. Ransomware works and too often cybercriminals walk away with bags of money (or piles of Bitcoin, anyway). “Following the World Health Organization's AIDS conference in 1989, Joseph L. Popp, a Harvard-educated biologist, mailed 20,000 floppy disks to event attendees.
Jul 20, 2022   |  By Benjamin Hodge
IT Infrastructure Monitoring (ITIM) tools like Progress’s own What’s Up Gold are the backbone of any IT Operations monitoring strategy. However, these tools are primarily focused on general purpose visibility across a wide range of infrastructure and systems with an emphasis on operational availability and performance.
May 5, 2022   |  By Flowmon
Network Detection & Response (NDR) is a key element that provides an additional level of security across the company wide network through detection of threats that bypass traditional security measures and materialize in the company’s digital environment. Progress Flowmon ADS (Anomaly Detection System) is a typical representative of an NDR system that combines various detection techniques to ensure that malicious activity is recognized and flagged as a security incident.
Nov 23, 2022   |  By Flowmon
The Leading Computer Part Manufacturer Gains Impressive Data Traffic Insights to its Multiple Warehouses and Offices with Progress Flowmon.
Nov 22, 2022   |  By Flowmon
As today’s networks grow increasingly complex, your network application and security teams are all struggling with network communications, hidden threats and misconfigurations. Each of these issues allows various vectors, increasing the likelihood of a cybersecurity incident. Often an incident occurs because an organization lacks a single pane of view, the right information sharing, and an automated, inter-departmental workflow.
Sep 5, 2022   |  By Flowmon
The increasing complexity of IT infrastructure and the move to the cloud make ensuring a great application experience difficult.
Aug 12, 2022   |  By Flowmon
With cyber threats on the rise each year, ensuring the security of your IT estate and being able to respond quickly to any potential threat is more crucial than ever. This is why Network Detection and Response tools play such a critical role in your security posture. We will introduce you to our Network Detection & Response tools, exploring the benefits of adding them to the solutions already deployed in your network infrastructure.
Aug 3, 2022   |  By Flowmon
The best way to stop ransomware attacks is to detect it early.
Jul 18, 2022   |  By Flowmon
Cryptojacking is when the attacker uses victims’ resources to mine cryptocurrency. Discover how attackers try to confuse victims using denial of service (DoS) attack and try to hide their crypto mining. But with Flowmon Network Detection and Response solution, attackers don't stand a chance.
Jun 9, 2022   |  By Flowmon
In today's world of global supply chains, a breach never stops at a supplier level but cascades all the way up the chain. So being able to detect and stop a supply chain attack at an early stage before an attacker exfiltrates confidential company data or damages company operations and reputation is critical to your organization's survival. Luckily, hackers always leave a trace, so proper detection can help you stop breaches at an early stage before hackers achieve their goals.
Apr 13, 2022   |  By Flowmon
Flowmon ADS 12 is here and ready to alert you faster than traditional NDR tools that only rely on blacklist with known malicious domains. With its latest release, Flowmon ADS 12 brings detection of anomalous behavior on the network and allows users to easily tune the detection. And that’s not all! Flowmon ADS 12 also enables you to lower the count of false-positives and decreases the time required to investigate detected events.
Apr 6, 2022   |  By Flowmon
Flowmon 12 is here and ready for hybrid/multi-cloud deployments! With its latest release, Flowmon 12 brings the support of native flow logs from Google Cloud, and Azure and improves support for AWS flow logs. And that’s not all! Flowmon 12 brings fully redesigned reporting for better readability, command line tool to assess quality of the flow data and improvements in workflow and user experience based on customer feedback.
Oct 21, 2020   |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
Oct 21, 2020   |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
Oct 1, 2020   |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
Oct 1, 2020   |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.