Flowmon

Flowmon Blog

SUBSCRIBE TO RSS
: 126
Fast DDoS Detection and Mitigation in SDN Environment

Fast DDoS Detection and Mitigation in SDN Environment

DDoS attacks are still growing threat to all businesses dependent on the connectivity. There are several approaches to protect against DDoS attacks, where the most cost efficient one is the out-of-...

Gift For Our Customers: Flowmon APM TG For Business Critical Application Monitoring

Gift For Our Customers: Flowmon APM TG For Business Criti...

This brand new module in the area of APM allows a way to monitor the availability of your business critical applications. The module is free for all our customers for a limited period. Check this p...

Nowadays anyone can hold you to ransom on the internet

Nowadays anyone can hold you to ransom on the internet

In the past years illegal activities have been moving more and more into the virtual world. Many types of cyber-attacks are now also able to be used in specific “business” activities.

22/08/17
Artificial Intelligence will be the decisive factor in the fight against cyber-threats

Artificial Intelligence will be the decisive factor in th...

It has been almost 50 years since the world's first computer virus was seen. Over the years, it has evolved from the amusement of a handful of enthusiasts into an extensive business that is endange...

15/08/17 Security
Three Steps to Monitor Cloud Services Usage

Three Steps to Monitor Cloud Services Usage

Are you using cloud services and don’t know why they are slow or how much data is transferred? The answers are in Flowmon.

Detect ExPetr/Petya wiper

Detect ExPetr/Petya wiper

A new malware attack is spreading on the internet and causes big troubles to users and administrators. Find out how Flowmon helps with this recent threat.

DDoS Protection in SDN Based Networking

DDoS Protection in SDN Based Networking

The efficient out-of-path DDoS detection and mitigation is not always available out of the box in virtual networking such as Contrail. Check this post to see how to generate NetFlow in Juniper Cont...

Hunting Frequent and Dangerous #1: Protection against Pharming, Phishing and Botnets

Hunting Frequent and Dangerous #1: Protection against Pha...

In our previous article we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pro...

28/06/17 Security