Operations | Monitoring | ITSM | DevOps | Cloud

How to Block an External Attack with FortiGate and Progress Flowmon ADS

It’s a question we hear often - how do we use the Progress Flowmon solution to block an attack? Flowmon is not an inline appliance that stands in the path of inbound traffic, so we partner with third-party vendors who supply equipment such as firewalls or unified security gateways. In this post, we’re going to show you how to instruct Fortinet’s firewall FortiGate via Flowmon ADS to block traffic in response to a detected anomaly or attack.

What's New in Flowmon ADS 12.5?

In this webinar, we’ll introduce the new features, including: AI-Powered Threat Briefings – A new dashboard that correlates global threat intelligence with your network’s current and historical data. Enhanced Event Visualization – Dive into a redesigned event detail streamlining user experience Expert-level recommendations - Guided next steps for each detection, helping analysts of all skill levels validate and resolve incidents with confidence.

7 Critical Insider Threat Indicators and How to Detect Them

Cybersecurity threats don’t come solely from external attackers. Insider threats also require your attention. Insider risk originates from employees, contractors or business partners who possess legitimate access to IT systems for their work tasks. They can access valuable data and systems that, if exposed or have some data stolen, could harm an organization’s reputation.

How to Detect Insider Threats: An In-Depth Guide

Cybersecurity threats don’t exclusively come from external attackers—insider threats must also be considered and mitigated. Insider threats come from employees, contractors or business partners who have legitimate access to IT systems to fulfill business functions. They have access to data and systems that are valuable to cyberattackers or would cause reputational damage if disclosed outside the organization. For example, an insider could leak private company information.

Supply Chain Security: Leveraging NDR to Combat Cyberthreats

Supply chains are crucial to business operations. It’s essential to verify that the connections required for them to operate don’t provide an opaque pathway for cybercriminals to exploit. This makes supply chain security a critical concern for organizations everywhere. The criminals determined to breach security and establish a persistent presence on networks are increasingly targeting vulnerabilities in supply chains. Through a single entry point, they can compromise multiple organizations.

Proactive Protection Beyond the Endpoint

The IT landscape for delivering applications and other services to end users has shifted to a hybrid deployment model, and this change is here to stay. While it provides myriad benefits for IT teams and their organizations, it also complicates the cybersecurity landscape, which needs protecting. Attackers continuously find new techniques to bypass traditional security measures.

Mastering NIS2 Compliance: Advanced Threat Detection Simplified

In this webinar, “Mastering NIS2 Compliance: Advanced Threat Detection Simplified” we’ll demystify NIS2 and demonstrate how the Progress Flowmon Network Detection and Response (NDR) solution can streamline compliance efforts and enhance an organization's security posture.

Analysts Share Their 2025 Cybersecurity Predictions

It's the start of a new year. Like last year, I want to examine what analysts are predicting for the cybersecurity landscape in 2025 and the risks they feel will be front and center. There is no shortage of predictions for this year’s cybersecurity landscape outlook—so many, it's impossible to compile them all. While not a thorough summary of the threats and risks in 2025, this article highlights the most common topics covered by cybersecurity specialists.