Flowmon blog

SUBSCRIBE TO RSS
: 11
Using Behavior Patterns to Detect Rising Threats

Using Behavior Patterns to Detect Rising Threats

We witnessed an unprecedented global outbreak of WannaCry infection last week. Let’s examine how one can detect and minimize the impact of WannaCry as well as other rising threats with the new feat...

17/05/17 Security
Configuring Palo Alto NGFW Flow Export to get Additional Layer of Security

Configuring Palo Alto NGFW Flow Export to get Additional ...

Today we will take a look on how to configure Palo Alto NGFW NetFlow export to Flowmon solution.

20/12/16 Security
Tuning the Network Behavior Analysis

Tuning the Network Behavior Analysis

Today, we are busting a myth about configurating and tuning of the NBA / UEBA solution to be time consuming project. Come and learn how you can tune Flowmon ADS in an hour.

11/12/16 Security
Flowmon ADS integration with Splunk

Flowmon ADS integration with Splunk

In most organizations security issues are the responsibility of many teams. Each of them manage only a selected part of the infrastructure and the global view is missing. Learn how to get overview...

29/11/16 Security
Enterprise network security 101: Make the most out of your investments in SIEM

Enterprise network security 101: Make the most out of you...

With the rising number of devices and services in the network organizations face the problem where requirements of ensuring security and smooth operations goes far beyond human capabilities. SIEM w...

21/10/16 Security
System for sharing and analysis of security events in Czech cyberspace

System for sharing and analysis of security events in Cze...

Our network monitoring abilities grow every year, but our viewing glass is largely limited to the network we manage. But what if we have information about what has just happened in other networks?

Malware in a view of Network Behavior Analysis

Malware in a view of Network Behavior Analysis

More than 75% of companies is infected by malware and they don't know about that. This is not an overstated declaration, this is todays reality. Network Behavior Analysis technology helps to uncove...

DDoS launched via IoT is reality. The importance of early detection grows

DDoS launched via IoT is reality. The importance of early...

In February last year, one of the leading internet service providers in Slovakia suffered from the largest DDoS attack in the history of the country. The total volume of the attack exceeded 400 Gbp...

12