Flowmon blog

SUBSCRIBE TO RSS
: 78
Defending Networks With

Defending Networks With "Best of Both Worlds"

More and more organisations are struggling to keep up with the rapid IT developments and the increasing number of attacks. One thing is for sure, neither are going to get any less. That is why it i...

Helping you keep your web application users satisfied

Helping you keep your web application users satisfied

There is an app for everything, or so the saying goes. Nowhere is this truer than in the world of business. Organizations increasingly rely on their applications performing to the maximum to guara...

Adaptative DDoS Attacks - Commercial and Operational Savings Tips

Adaptative DDoS Attacks - Commercial and Operational Savi...

DDoS attacks have increased by 16% since the beginning of 2018, achieving record high throughput volumes (1.35Tps) and featuring adaptative mechanisms and new attack vector techniques.

04/07/18 DDoS protection
Integrate Flowmon ADS with Hillstone iNGFW for Ultimate Protection

Integrate Flowmon ADS with Hillstone iNGFW for Ultimate P...

Network Behavior Analysis and firewall solutions nicely complements each other. Let’s check how to integrate Flowmon ADS with Hillstone iNGFW for comprehensive network security.

22/06/18 Security
Flow Analysis Using Filters – Exploring DNS Communication of Servers

Flow Analysis Using Filters – Exploring DNS Communication...

In this step by step guide you will learn how to use filters to analyze network traffic and better understand your network.

Get the most out of the profiles in Flowmon Monitoring Center

Get the most out of the profiles in Flowmon Monitoring Ce...

Today we will learn the concept of profiles in Flowmon Monitoring Center and examples how to get the most out of them.

Success Story: East-West Traffic Visibility Enabled by Flowmon Probes

Success Story: East-West Traffic Visibility Enabled by Fl...

One of the largest banks in the world is using Flowmon thanks to probe’s wide L2 and tunneling protocols support including Overlay Transport Virtualization.

Crypto-jacking, Crypto-mining and Crypto-currency security

Crypto-jacking, Crypto-mining and Crypto-currency security

Earlier this year, news was reported about Slovak Telecom secretly injecting a crypto-mining script into a website that users accessed. This was all done, apparently, without the consent of Slovak ...