Brno, Czech Republic
May 7, 2021   |  By Flowmon
Your feedback, current trends, and a good chunk of innovation are what shapes the current and future face of our solution. Read on to find out what is coming in 2021.
Mar 8, 2021   |  By Pavel Minarik
The vulnerability called SIGRed (CVE-2020-1350) has been around for 17 years, during which time it was present in Windows Server operating systems from version 2003 through 2019 and received a maximum severity rating of 10. It was finally patched in July 2020. As the vulnerability allows an attacker to perform remote code execution on Windows Server via DNS, it poses an extremely serious danger and can propagate over the network without user interaction.
Mar 3, 2021   |  By Flowmon
It is not only the COVID-19 pandemic and the associated rise of remote work that is shaping the everyday routine of network security practitioners. Let's take a look at 5 major trends in network security.
Feb 10, 2021   |  By Jiri Knapek
It’s a question we hear often - how to use Flowmon to block an attack? Flowmon is not an inline appliance to stand in the path of inbound traffic, so we partner with 3rd party vendors who supply equipment like firewalls or unified security gateways. In this post, I’m going to show you how to instruct Fortinet’s firewall FortiGate via Flowmon ADS to block traffic in response to a detected anomaly or attack.
Feb 5, 2021   |  By Petr Pecha
Improve your security posture with community Indicators of Compromise and use reputation data to detect threats in encrypted traffic. On the digital battleground, it pays to stay on your toes, but there are ways to make the work easier. Flowmon ADS 11.2 brings you new and refined methods of avoiding known threats and learning from attacks carried out against others. Main news.
Feb 1, 2021   |  By Petr Pecha
High-level information and speedy configuration for the busy network administrator. If you want to respond to network issues quickly and promptly, you can’t waste time digging for information. So how can Flowmon 11.1 help?
Dec 17, 2020   |  By Pavel Minarik
Flowmon Anomaly Detection System from Kemp now contains Indicators of Compromise (IoC) for the SUNBURST trojan specifically. Users of the Flowmon network detection and response (NDR) tool can check if they are under attack and set up measures to detect SUNBURST. This December, the world shook at the news of several US government bodies falling victim to a highly sophisticated attack.
Dec 11, 2020   |  By Flowmon
When cloud adoption shifts from a new trend to daily reality, it causes headaches to everyone responsible for the performance, availability, and security of business services or apps. How do you monitor owned and rented infrastructure with all of their differences without creating visibility silos and ending-up with a bunch of disparate tools?
Nov 12, 2020   |  By Jiri Tobola
For more than a decade we have been concentrating our best talents into two areas. Improving technology and making our products available globally. Now, the time has come to massively scale up our business and technological power.
Nov 12, 2020   |  By Pavel Minarik
Kemp, known for its well-tuned and easy-to-use load balancer LoadMaster, has acquired Flowmon, extending its product portfolio and growing through acquisition. So you may ask, how does the technology fit?
Dec 11, 2020   |  By Flowmon
Watch Keysight and Flowmon present a cybersecurity solution reaching into the layer one transmission and utilizing behavior analysis to identify a hacker’s fingerprint.  Keysight will give a high level explanation on how to build an efficient visibility architecture utilizing Taps and Network Packet Brokers. Keysight will then provide an introduction to Threat simulator, a breach and attack simulation platform, which will be used in the demonstration to provide realistic attack traffic to the Flowmon. 
Dec 2, 2020   |  By Flowmon
By extending the capabilities of traditional network visibility, cloud adoption no longer comes at the cost of losing control over the quality of mission-critical systems. Even when employees can connect to an app from a mobile phone via places like a crowded airport Wi-Fi, with Flowmon's support of the cloud-native Packet Mirroring function, NetOps can ensure smooth service. This session will demonstrate how to identify the precise nature and origin of networking issues between your clients and apps hosted in Google Cloud Services.
Nov 6, 2020   |  By Flowmon
Kemp acquires Flowmon for predictive network performance monitoring and diagnostics (NPDM) and network detection and response (NDR). Kemp boosts load balancing and application delivery controller (ADC) solutions with advanced flow-based monitoring and encrypted traffic analysis to enable customers to uncover cybersecurity blind spots and accelerate application incident response. Kemp Technologies CEO Ray Downes and Flowmon Networks CEO J Tobola discuss the acquisition.
Nov 5, 2020   |  By Flowmon
In the digital world, user-centricity is the one thing all successful modern applications have in common. But no matter how great the application is, users’ experience - whether customers or employees - is instantly ruined if performance degrades. This webinar will explain the differences between four major approaches to application and user experience monitoring and show how to get true end-to-end coverage by combining them.
Sep 18, 2020   |  By Flowmon
Flowmon Networks, a global network intelligence company, and Paessler, a leading IT monitoring specialist, have integrated their solutions to bring together comprehensive IT monitoring capabilities with AI-powered analysis and advanced security features. Join this webinar to learn about the significant benefits of the integration for those responsible for ensuring availability, performance, and security for IT environments. We will also present a live demonstration of integration capabilities via use case focusing on operational and security aspects of remote workers.
Sep 3, 2020   |  By Flowmon
Facing the ever-changing threat landscape, businesses more than ever before seek for fast and precise answers when protecting their values. The new Flowmon ADS 11 is here to meet your needs, bringing massive performance increase, noise-free incident understanding and superior UX. Join this webinar to learn how you can lift your security operations up with a cutting edge network detection and response tool.
Jul 30, 2020   |  By Flowmon
Flowmon 11 has brought a redefined user ergonomy. A cornerstone of the overall enhanced UX is a library of predefined dashboards for various use cases, reflecting the most common needs of Flowmon users. Join this webinar and learn how to streamline network troubleshooting workflow with new dashboards.
Jun 29, 2020   |  By Flowmon


Oct 21, 2020   |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
Oct 21, 2020   |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
Oct 1, 2020   |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
Oct 1, 2020   |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.