Flowmon blog

SUBSCRIBE TO RSS
: 88
Dynamic Baselining and Adaptive Threshold in DDoS Defender

Dynamic Baselining and Adaptive Threshold in DDoS Defender

Dynamic baselining allows to respond to increasing volumes of traffic based on adaptive thresholds and defined rules. Flowmon Networks has introduced DDoS Defender for DoS/DDoS detection and subseq...

17.12.15
Internet Service Providers to Deliver Security as a Service with Flowmon

Internet Service Providers to Deliver Security as a Servi...

Some of significant present cyber threats are the attacks targeting government or finance institutions to cut them off the Internet, penetrations into protected systems or malware earning money for...

02.12.15
VoIP traffic monitoring use-case

VoIP traffic monitoring use-case

Are your VoIP bills too damn high? Are you paying more than you should? Maybe you don’t even know it! You might have a similar problem as our customer had. Let’s see what the problem was and how Fl...

26.11.15
Measuring TCP Retransmissions in Flowmon

Measuring TCP Retransmissions in Flowmon

Network Performance Monitoring was extended with monitoring of TCP retransmissions and out of order packets. Using these metrics we are able to identify data transfer issues. This article explains ...

19.10.15
Extended Active Devices

Extended Active Devices

How often you need to know, who is sitting behind devices in your network, who communicated in certain time frame or a month ago? Flowmon solution provides reliable user identification based authen...

Flowmon-GÉANT Story: Monitoring Network with 50 Million Users

Flowmon-GÉANT Story: Monitoring Network with 50 Million U...

Big things in life have quite beginnings sometimes. More than ten years ago, a small group of Czech scientists worked for the pan-European association GÉANT. They had no idea that this project woul...

28.07.15
Flowmon Monitoring Center vs. Flowmon ADS

Flowmon Monitoring Center vs. Flowmon ADS

Why would you need Network Behavior Analysis once you have deployed flow collector and traffic reporting? Well, there are scenarios where automatic anomaly detection goes far beyond capabilities of...

08.06.15
User identity as part of flow data

User identity as part of flow data

How often you need to know who is sitting behind that IP address right now or who was logged there one month ago? Flow monitoring will give you information about IP, MAC address or DNS name but get...

23.03.15
... 11