Flowmon blog

SUBSCRIBE TO RSS
: 35
Alerting in Flowmon Monitoring Center

Alerting in Flowmon Monitoring Center

Using alerts can significantly simplify your life. There is no need to sit in front of a monitor and search for operational problems in your network. In this blog post, we will go through the capab...

5 things that pay off when doing PoC projects

5 things that pay off when doing PoC projects

Every customer wants to be sure they are making the right decisions. PoC campaigns are a great way to achieve this and also how to distinguish between empty phrases and real benefits.

04. 01. 17
Pros and Cons of Agent-less Application Performance Monitoring

Pros and Cons of Agent-less Application Performance Monit...

Network-based Application Performance Monitoring solution measures delays in network and application for all transactions of all users. If any problem occurs, it immediately reports and alerts the ...

Configuring Palo Alto NGFW Flow Export to get Additional Layer of Security

Configuring Palo Alto NGFW Flow Export to get Additional ...

Today we will take a look on how to configure Palo Alto NGFW NetFlow export to Flowmon solution.

20. 12. 16 Bezpečnost
Tuning the Network Behavior Analysis

Tuning the Network Behavior Analysis

Today, we are busting a myth about configurating and tuning of the NBA / UEBA solution to be time consuming project. Come and learn how you can tune Flowmon ADS in an hour.

11. 12. 16 Bezpečnost
Flowmon ADS integration with Splunk

Flowmon ADS integration with Splunk

In most organizations security issues are the responsibility of many teams. Each of them manage only a selected part of the infrastructure and the global view is missing. Learn how to get overview...

29. 11. 16 Bezpečnost
Enterprise network security 101: Make the most out of your investments in SIEM

Enterprise network security 101: Make the most out of you...

With the rising number of devices and services in the network organizations face the problem where requirements of ensuring security and smooth operations goes far beyond human capabilities. SIEM w...

21. 10. 16 Bezpečnost
Getting the Flows to Cloud Securely

Getting the Flows to Cloud Securely

Nobody wants to share his communication with the public. And customers of cloud services based on flow data analysis are no exception. They need to be sure that their traffic is not “overheared” wh...

13. 10. 16 Datové toky
12345