Flowmon Blog

SUBSCRIBE TO RSS
: 12
Revised Flowmon interface: First step to customer-centric UX

Revised Flowmon interface: First step to customer-centric UX

Revised user interface as it comes with Flowmon 10.0 is one but important stop on our long term initiative that will end up with completely new concept of the Flowmon solution providing unified vie...

18/01/19
What made us create Distributed Architecture

What made us create Distributed Architecture

Developing hyper-scalable network analytics design, called Flowmon Distributed Architecture, was one of the biggest technology challenges we’ve faced to date. What were the drivers behind this reso...

Monitor user behaviour to detect Insider Threats

Monitor user behaviour to detect Insider Threats

The risk of Insider Threats has grown massively with attackers getting around the increasingly complex perimeter protection of Enterprise organisations. It is one of the most common ways customer d...

HUNTING FREQUENT AND DANGEROUS #2: Protection against Malware, Ransomware and Zero-day exploit

HUNTING FREQUENT AND DANGEROUS #2: Protection against Mal...

In our previous articles we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pr...

Customer Success Story: When Automation Fails

Customer Success Story: When Automation Fails

Almost every vendor, Flowmon included, claims its NPMD solution delivers automation, machine learning, context analytics and other modern features. So, it is easy for admins to handle networks toda...

Flowmon Studio #13 - What Stuart Smith has learned during 17 years of expertise in APM

Flowmon Studio #13 - What Stuart Smith has learned during...

Some of you may have seen our Flowmon Studio series. Over the years, we’ve become experts in network visibility and security. It appears that becoming experts in video shooting will take more than ...

Artificial Intelligence will be the decisive factor in the fight against cyber-threats

Artificial Intelligence will be the decisive factor in th...

It has been almost 50 years since the world's first computer virus was seen. Over the years, it has evolved from the amusement of a handful of enthusiasts into an extensive business that is endange...

15/08/17 Security
Hunting Frequent and Dangerous #1: Protection against Pharming, Phishing and Botnets

Hunting Frequent and Dangerous #1: Protection against Pha...

In our previous article we discovered the most common types of cyberattacks. We also learned how they are designed and how they operate. Such understanding helps us build adequate and effective pro...

28/06/17 Security
12