Flowmon Blog

: 167

What is Hidden in Encrypted Internet Traffic Streams

Full internet encryption is on the horizon and with it the risk that hackers will gain access to your computer network.


Packets and Flow Data: best of breed combination for net...

IT experts usually distinguish between two types of systems for network monitoring: flow-based and packet-based. But facing today's challenges brought by bandwidth explosion, new platforms and hype...


How to use Network Performance Metrics with Flowmon

Using basic network performance metrics, namely Round Trip Time (RTT) and Server Response Time (SRT), is an easy-to-go way how to deal with performance issues in your network. Let’s take a closer l...


5 predictions for cyber security in 2019

Last year completely refuted doubts about the increasing cyber security risks. Hackers, obtained sensitive data on hundreds of German politicians, including Chancellor Merkel and accessed data rela...

26/03/19 Security

3 Network Performance Monitoring Metrics to Deal with Per...

In my 20+ years career, I’ve worked with two types of technologies. Those that took extensive marketing efforts to communicate their value and failed to deliver it, as well as technologies that pro...

20/03/19 Flow data

Creating custom logs from NetFlow

Did you know you can create logs with any flow information and export it to 3rd party systems like SIEM. Check this post to see how to do it and what we have prepared for you.

31/01/19 Netflow

DDoS Protection tool without BGP Peering Analysis? Why not?

It is difficult to count how many times I have been involved in discussions about the role of BGP peering analysis in DDoS protection. Usually, people think of how these technologies are connected ...

Revised Flowmon interface: First step to customer-centric UX

Revised user interface as it comes with Flowmon 10.0 is one but important stop on our long term initiative that will end up with completely new concept of the Flowmon solution providing unified vie...