Brno, Czech Republic
Aug 2, 2021   |  By Flowmon
We have recently published a script for the integration of the Anomaly Detection System (ADS) with a Check Point firewall. This ensures automated threat detection and response where attackers are blocked from accessing the network resources and causing even further harm. The previous integration with Fortinet describes a way of stopping the attacker at the perimeter. The following use case is largely the same, except with a Check Point firewall instead.
Jul 13, 2021   |  By Petr Pecha
As company infrastructures now sprawl across several different environments, additional tools need to be added to the portfolio. But adhering to the traditional approach of focusing on individual devices, their health, performance, and availability, only aggravates its downsides; i.e. visibility blind spots, tool disparity, and therewith connected “swivel-chair” management. The problem calls for increased network traffic visibility that does not come at the cost of extra work.
Jun 29, 2021   |  By Pavel Minarik
In one of the previous blog posts from the load balancing education series, we discussed the Edge Security Pack functionality to provide an additional layer of security in front of an application workload to ensure that only properly authenticated users can interact with the application. In this role, the LoadMaster acts as a gateway for the application and handles user authentication through a third-party identity provider such as Microsoft Active Directory.
Jun 22, 2021   |  By Flowmon
Global Site Load Balancing (GSLB) is an important part of your application infrastructure, but many people don’t understand its benefits. In this post we’ll explain how GSLB works and how LoadMaster GEO can bring big benefits in availability and performance at a fraction of the cost of alternatives.
Jun 4, 2021   |  By Flowmon
In the previous blog post, we discussed load balancing essentials and methods of traffic distribution among the real servers. When you publish an application with Kemp LoadMaster you can add lots of extra capabilities on top of the basic load balancing. In this post we’re going to look at ways of securely publishing legacy applications using the LoadMaster Edge Security Pack (ESP) and SSL Acceleration features.
Jun 2, 2021   |  By Pavel Minarik
Network anomalies vary in nature. While some of them are easy to understand at first sight, there are anomalies that require investigation before a resolution can be made. The MITRE ATT&CK framework introduced in Kemp Flowmon ADS 11.3 streamlines the analysis process and gives security analyst additional insight by leveraging knowledge of adversaries' techniques explaining network anomalies via the ATT&CK framework point of view.
May 27, 2021   |  By Flowmon
In this post we’ll review some of the essential ideas in Load Balancing to help you understand how to get the best configuration for your application. Load balancing is an essential part of any application deployment to provide high availability, performance and security. We’ll focus on understanding and selecting scheduling and persistence algorithms and using the new LoadMaster Network Telemetry feature to validate the results.
May 24, 2021   |  By Flowmon
The Kemp Flowmon Packet Investigator 11.1 is easier to use and covers a broader scope of root-cause analysis scenarios.
May 17, 2021   |  By Flowmon
The new Kemp Flowmon ADS 11.3 enhances your contextual understanding with built-in knowledge of adversary tactics and techniques described in the MITRE ATT&CK framework.
May 14, 2021   |  By Flowmon
Today’s networks have evolved a long way since their early days and have become rather complicated systems that comprise numerous different network devices, protocols, and applications. Consequently, it is practically impossible to have a complete overview of what is happening in the network or whether everything in the network works as it should. Eventually, network problems will arise.
Aug 2, 2021   |  By Flowmon
See how Kemp Flowmon ADS can work in tandem with a Check Point firewall to automatically quarantine an IP address upon security event detection.
Dec 11, 2020   |  By Flowmon
Watch Keysight and Flowmon present a cybersecurity solution reaching into the layer one transmission and utilizing behavior analysis to identify a hacker’s fingerprint.  Keysight will give a high level explanation on how to build an efficient visibility architecture utilizing Taps and Network Packet Brokers. Keysight will then provide an introduction to Threat simulator, a breach and attack simulation platform, which will be used in the demonstration to provide realistic attack traffic to the Flowmon. 
Dec 2, 2020   |  By Flowmon
By extending the capabilities of traditional network visibility, cloud adoption no longer comes at the cost of losing control over the quality of mission-critical systems. Even when employees can connect to an app from a mobile phone via places like a crowded airport Wi-Fi, with Flowmon's support of the cloud-native Packet Mirroring function, NetOps can ensure smooth service. This session will demonstrate how to identify the precise nature and origin of networking issues between your clients and apps hosted in Google Cloud Services.
Nov 6, 2020   |  By Flowmon
Kemp acquires Flowmon for predictive network performance monitoring and diagnostics (NPDM) and network detection and response (NDR). Kemp boosts load balancing and application delivery controller (ADC) solutions with advanced flow-based monitoring and encrypted traffic analysis to enable customers to uncover cybersecurity blind spots and accelerate application incident response. Kemp Technologies CEO Ray Downes and Flowmon Networks CEO J Tobola discuss the acquisition.
Nov 5, 2020   |  By Flowmon
In the digital world, user-centricity is the one thing all successful modern applications have in common. But no matter how great the application is, users’ experience - whether customers or employees - is instantly ruined if performance degrades. This webinar will explain the differences between four major approaches to application and user experience monitoring and show how to get true end-to-end coverage by combining them.
Sep 18, 2020   |  By Flowmon
Flowmon Networks, a global network intelligence company, and Paessler, a leading IT monitoring specialist, have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. Join this webinar to learn about the significant benefits of the integration for those responsible for ensuring availability, performance, and security for IT environments. We will also present a live demonstration of integration capabilities via use case focusing on operational and security aspects of remote workers.
Oct 21, 2020   |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
Oct 21, 2020   |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
Oct 1, 2020   |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
Oct 1, 2020   |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.