Developments in DDoS Defender 5.2 are in the spirit of performance and user experience.
In this blog, we will guide you through the process of how to enable two-factor-authentication (2FA) via TACACS+ on the Flowmon system.
This year brings challenges to tackle and horizons to explore. Find out what Flowmon has in store for 2020.
This document is aimed at operators and analysts who use Flowmon to detect and analyse security events. The document introduces a set of so-called best practices, i.e. a summary of the manufacturer...
96% of IT professionals claim confidence to repel encrypted traffic threats. Still, only one third of businesses cover all attack vectors of this steadily growing nefarious activity.
This is the story of a large-sized company (1000-5000 employees) that understood the importance of IT in the digital era and its business impact. The IT department needed a new impetus to reconside...
This is the story of a medium-sized company (250-1000 employees) on its transition from a reactive IT department that acted like a firefighter, to a modern team having full control and visibility i...
Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence of this decision, our network traffic characteris...