Brno, Czech Republic
2007
  |  By Filip Cerny
Numerous best practices help to deliver robust cybersecurity. Adopting these will involve combining many of the technologies already outlined in the previous entry.
  |  By Martin Škoda
A newly analyzed threat, Chrysalis, is a sophisticated backdoor attributed to the Chinese APT group Lotus Blossom. The malware employs advanced evasion techniques including heavy obfuscation, API hashing, dynamic DNS resolution, custom encryption and stealthy C2 communication disguised as legitimate traffic.
  |  By Filip Cerny
Cybersecurity refers to the processes and technology used to protect information technology networks, data, people, servers, endpoint devices and other IT-related systems from cyberattacks. The need for this protection has never been greater. All organizations (in both private and public sectors) now exist in a threat landscape that allows attacks against their IT infrastructure.
  |  By Filip Cerny
Log management and Network Detection and Response (NDR) solutions are closely related but offer different layers of visibility. Rather than overlapping, they complement each other, together providing a connected view of what’s happening in your environment. How exactly? Let’s take a closer look.
  |  By Filip Cerny
At Progress, we continue to develop and enhance the Progress Flowmon product family. The latest update brings the core Flowmon product to release 13.0, and it includes remarkable performance improvements, strengthened security and expanded protocol support. Full details of what’s new and improved in the latest release are available on the Flowmon product page. In this blog, we’re excited to highlight the newest features and improvements to the Flowmon solution.
  |  By Nick Vlasov
We recently delivered a webinar titled IT/OT Convergence: Proactive Threat Detection for Industrial Control Systems (also available via Brighttalk).
  |  By Filip Cerny
Higher education institutions face unique cybersecurity challenges due to their complex networks, diverse user base and open academic environments. With thousands of students, staff and faculty members accessing resources from various locations and devices, universities must have visibility of what’s happening on their networks and robust and responsive cybersecurity protection to help safeguard them.
  |  By Jiri Knapek
It’s a question we hear often - how do we use the Progress Flowmon solution to block an attack? Flowmon is not an inline appliance that stands in the path of inbound traffic, so we partner with third-party vendors who supply equipment such as firewalls or unified security gateways. In this post, we’re going to show you how to instruct Fortinet’s firewall FortiGate via Flowmon ADS to block traffic in response to a detected anomaly or attack.
  |  By Filip Cerny
Cybersecurity threats don’t come solely from external attackers. Insider threats also require your attention. Insider risk originates from employees, contractors or business partners who possess legitimate access to IT systems for their work tasks. They can access valuable data and systems that, if exposed or have some data stolen, could harm an organization’s reputation.
  |  By Filip Cerny
Progress is pleased to announce that we have updated our industry-leading Flowmon Anomaly Detection System (ADS) to version 12.5. The latest update has these additions: Let’s take a look.
  |  By Progress Flowmon
Explore what’s ahead for Progress Flowmon in this roadmap session presented by Head of Product Nick Vlasov. Learn about upcoming innovations in AI‑driven analytics, automated investigation playbooks, detection tuning improvements and long‑term platform direction. Perfect for network engineers, security analysts and IT leaders looking to strengthen visibility, performance and security. Watch now to see what’s coming next.
  |  By Progress Flowmon
Join security product experts Filip Cerny and Jan Stritezsky as they unveil the latest innovations in Flowmon 13. This live session will walk you through the most impactful upgrades designed to boost performance, streamline investigations and enhance security visibility across your network.
  |  By Progress Flowmon
Network analysis doesn’t have to be slow or complicated. In this episode, we’ll show you how to master Flowmon Profiles so you can dramatically cut down your query time and focus on solving problems faster.
  |  By Progress Flowmon
In this webinar, we’ll introduce the new features, including: AI-Powered Threat Briefings – A new dashboard that correlates global threat intelligence with your network’s current and historical data. Enhanced Event Visualization – Dive into a redesigned event detail streamlining user experience Expert-level recommendations - Guided next steps for each detection, helping analysts of all skill levels validate and resolve incidents with confidence.
  |  By Flowmon
In this webinar, “Mastering NIS2 Compliance: Advanced Threat Detection Simplified” we’ll demystify NIS2 and demonstrate how the Progress Flowmon Network Detection and Response (NDR) solution can streamline compliance efforts and enhance an organization's security posture.
  |  By Flowmon
Today's primary cybersecurity challenge is event overload. With a flood of alerts coming from numerous systems, analysts struggle to prioritize and investigate effectively. This not only delays responses to genuine threats, but also leaves organizations more vulnerable. For Progress Flowmon, accuracy and rapid response are essential. Flowmon is an AI-driven network security analyst that works alongside your team, monitoring your network 24/7.
  |  By Flowmon
Today's primary cybersecurity challenge is event overload. With a flood of alerts coming from numerous systems, analysts struggle to prioritize and investigate effectively. This not only delays responses to genuine threats, but also leaves organizations more vulnerable. For progress, Flowmon, accuracy and rapid response are essential. Flowmon is an AI -driven network security analyst that works alongside your team, monitoring your network 24/7.
  |  By Flowmon
In this video, we explore the latest ransomware trends and how your security team can stay one step ahead of cybercriminals with advanced ransomware detection solutions like Progress Flowmon. Our cybersecurity experts discuss critical topics, including: Don't miss this opportunity to gain insights and practical tips to strengthen your organization’s ransomware defenses.
  |  By Flowmon
In this webinar, we will demonstrate the powerful capabilities of Flowmon, focusing on: Watch now!
  |  By Flowmon
In this video, we'll demonstrate Flowmon Collector Demo capabilities.
  |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
  |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
  |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
  |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.