Flowmon Blog

SUBSCRIBE TO RSS
: 114
ICS/SCADA Monitoring and Anomaly Detection

ICS/SCADA Monitoring and Anomaly Detection

Operational Technology and Information Technology are merging. And spoken frankly, they do not understand each other. OT systems have lived for years totally isolated and now they should be connect...

24/05/19
What is hidden in encrypted internet traffic streams

What is hidden in encrypted internet traffic streams

Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network.

15/05/19
 Packets and Flow Data: best of breed combination for network forensics

Packets and Flow Data: best of breed combination for net...

IT experts usually distinguish between two types of systems for network monitoring: flow-based and packet-based. But facing today's challenges brought by bandwidth explosion, new platforms and hype...

29/04/19
How to use Network Performance Metrics with Flowmon

How to use Network Performance Metrics with Flowmon

Using basic network performance metrics, namely Round Trip Time (RTT) and Server Response Time (SRT), is an easy-to-go way how to deal with performance issues in your network. Let’s take a closer l...

23/04/19
5 predictions for cyber security in 2019

5 predictions for cyber security in 2019

Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data rela...

26/03/19 Security
3 Network Performance Monitoring Metrics to Deal with Performance Degradation

3 Network Performance Monitoring Metrics to Deal with Per...

In my 20+ years career, I’ve worked with two types of technologies. Those that took extensive marketing efforts to communicate their value and failed to deliver it, as well as technologies that pro...

20/03/19 Flow data
Creating custom logs from NetFlow

Creating custom logs from NetFlow

Did you know you can create logs with any flow information and export it to 3rd party systems like SIEM. Check this post to see how to do it and what we have prepared for you.

31/01/19 Netflow
DDoS Protection tool without BGP Peering Analysis? Why not?

DDoS Protection tool without BGP Peering Analysis? Why not?

It is difficult to count how many times I have been involved in discussions about the role of BGP peering analysis in DDoS protection. Usually, people think of how these technologies are connected ...