Flowmon

Flowmon Blog

SUBSCRIBE TO RSS
: 148

Boosting Enterprise IT to the Next Level

This is the story of a large-sized company (1000-5000 employees) that understood the importance of IT in the digital era and its business impact. The IT department needed a new impetus to reconside...

26/03/20

Journey from Reactive IT to Proactive Control

This is the story of a medium-sized company (250-1000 employees) on its transition from a reactive IT department that acted like a firefighter, to a modern team having full control and visibility i...

23/03/20

The Upsurge of Home Office: Best Practices to Keep Your N...

Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence of this decision, our network traffic characteris...

19/03/20

Validate Indicators of Compromise in Your Network

You may have recently come across indicators of compromise (IoC), such as malicious IP addresses, which you can use to validate whether you have been affected or not. For example, a national cyber ...

17/03/20

Network Traffic Monitoring with and without Encrypted Tra...

Having or not having an encrypted traffic analysis feature in your network monitoring system makes a huge difference.

Emotet Malware: Email Spoofer Awakening

According to IBM X-Force, the Emotet malware has recently been spreading in Germany and Japan, targeting companies in the area more and more aggressively.

12/02/20

5 Reasons Why Hackers Will Have a Bumper Harvest

In the coming years we can expect an even larger and more sophisticated wave of theft, fraud, extortion and deactivation of the various services run by businesses and public organisations. Here are...

31/01/20

Enhancing Network Visibility & Security in Google Cloud

As networks grow in complexity, a proactive approach, prevention and early detection of anomalies are the only way forward toward delivering reliable, secure, and scalable services to users and cus...

10/12/19