Flowmon Blog

SUBSCRIBE TO RSS
: 109
Lessons learned: Developing Flowmon foreign operations

Lessons learned: Developing Flowmon foreign operations

For six years I’ve been standing in the front line of Flowmon international business development. As an area manager I’ve launched operations on several markets across Europe. Usually with no brand...

30/09/16
How Flowmon can help you grow your career?

How Flowmon can help you grow your career?

Three weeks ago I was giving a presentation to a customer and you wouldn’t believe what question I have received. “So how the deployment of Flowmon can help me and my colleague to grow in career?” ...

29/09/16
Frequent & Dangerous: Discover seven cyberattacks you will face sooner or later

Frequent & Dangerous: Discover seven cyberattacks you wil...

“Cybercriminals to compromise company: business loses $56 million.” Do you find this headline familiar? Such front-page news and analysis of large-scale attacks hit us every day. In this article I ...

15/09/16
Encrypted flow forwarding and other news in Flowmon 8.02

Encrypted flow forwarding and other news in Flowmon 8.02

New version of our flag ship product has been released as a Flowmon 8.02. One of the most important feature is reliable and encrypted flow forwarding option. It also brings reinvented view on Activ...

DNS Monitoring in Flowmon – part 2/2

DNS Monitoring in Flowmon – part 2/2

Today we will have a look on how our advanced behavioral intelligence of Flowmon ADS can detect DNS service related security incidents and how it helped our customer find malware infected hosts in ...

DNS Monitoring in Flowmon – part 1/2

DNS Monitoring in Flowmon – part 1/2

DNS is one of the most essential network services - often poorly monitored - and any outages may lead to a major business impact. Let’s take a look how Flowmon is able to monitor DNS protocol and h...

System for sharing and analysis of security events in Czech cyberspace

System for sharing and analysis of security events in Cze...

Our network monitoring abilities grow every year, but our viewing glass is largely limited to the network we manage. But what if we have information about what has just happened in other networks?

Just like David and Goliath. How DDoS Defender Succeded

Just like David and Goliath. How DDoS Defender Succeded

I’m having a goose bumps as I’m holding a fresh case study of a Managed Service Provider from the Netherlands. It was not an easy task to fulfill their technical requirements and, what’s more, the ...

01/07/16
... 11121314