Flowmon blog

SUBSCRIBE TO RSS
: 59
Worrying About Your WiFi Security Due to KRACK Vulnerability?

Worrying About Your WiFi Security Due to KRACK Vulnerabil...

Widely used WPA2 standard for WiFi Networks has been broken and it will take months to patch all affected appliances. It is a right time to consider how powerful your security is in order to deal w...

HUNTING FREQUENT AND DANGEROUS #2: Protection against Malware, Ransomware and Zero-day exploit

HUNTING FREQUENT AND DANGEROUS #2: Protection against Mal...

In our previous articles we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pr...

Customer Success Story: When Automation Fails

Customer Success Story: When Automation Fails

Almost every vendor, Flowmon included, claims its NPMD solution delivers automation, machine learning, context analytics and other modern features. So, it is easy for admins to handle networks toda...

Flowmon Studio #13 - What Stuart Smith has learned during 17 years of expertise in APM

Flowmon Studio #13 - What Stuart Smith has learned during...

Some of you may have seen our Flowmon Studio series. Over the years, we’ve become experts in network visibility and security. It appears that becoming experts in video shooting will take more than ...

Native Support for DDoS mitigation with F5® DDoS Solutions

Native Support for DDoS mitigation with F5® DDoS Solutions

Flowmon Networks and F5 Networks have joint forces to protect Service Providers and their enterprises customers against DDoS attacks. The integration of Flowmon’s fast flow-based DDoS detection wit...

02/10/17 DDoS protection
Fast DDoS Detection and Mitigation in SDN Environment

Fast DDoS Detection and Mitigation in SDN Environment

DDoS attacks are still growing threat to all businesses dependent on the connectivity. There are several approaches to protect against DDoS attacks, where the most cost efficient one is the out-of-...

Gift For Our Customers: Flowmon APM TG For Business Critical Application Monitoring

Gift For Our Customers: Flowmon APM TG For Business Criti...

This brand new module in the area of APM allows a way to monitor the availability of your business critical applications. The module is free for all our customers for a limited period. Check this p...

Nowadays anyone can hold you to ransom on the internet

Nowadays anyone can hold you to ransom on the internet

In the past years illegal activities have been moving more and more into the virtual world. Many types of cyber-attacks are now also able to be used in specific “business” activities.

22/08/17
12345678