Flowmon allows you to pinpoint the root cause of network problems, gives you a complete network visibility and spots security threats with ease thanks to its AI-engine and unmatched flexibility.
For NPMD, troubleshooting and capacity planning with full analytics drilldown.
Customizable interface for the noise-free visualization of traffic structure or performance metrics.
Ransomware, malware, insider & unknown threats, SUNBURST Trojan Attack, etc.
Between perimeter and endpoint protection. Leverage AI/ML to detect threats others miss.
Leverage your existing network devices like switches, routers, firewalls, packet brokers or a LoadMaster load balancers as a data source. Flowmon supports multiple NetFlow, IPFIX formats and cloud FlowLogs to provide maximal compability.
You can also use dedicated Flowmon Probes to generate data from your network traffic (virtual and cloud Collectors include probe functionality).
The central piece of the Flowmon solution is the Collector. It stores and analyzes network data and provides you with actionable data and visualization. With this insight in hand, you can carry out your day-to-day network troubleshooting, bandwidth monitoring, and capacity planning.
An AI-powered signatureless detection engine leveraging behavior analysis and other methods to expose network-borne threats.
An automated network traffic auditing tool that automatically captures pcap files and analyzes them to report the root cause and give remedial suggestions.
An agentless system for measuring application performance and reporting on usage, capacity, error rate, and SLA.
Detected security events are categorized as MITRE ATT&CK® tactics and techniques to provide a clear idea about the attack’s severity, scope and future development. Quickly access full detail of the event to facilitate prompt triage and response.
Reduce the time required to understand the root cause of poor user experience with automated detection, quick triage, predictive insights, and relevant suggestions for remedial actions.
Leverage data from the entire application delivery chain to enable availability and SLA metering, capacity planning, troubleshooting, or compliance enforcement.
Flowmon ADS and its ML-powered detection engine is combining multiple detection methods to reveal any malicious behavior, attacks against mission-critical applications, and data breaches at any point of the threat’s lifecycle, even in encrypted traffic.
Get a clear insight for user experience monitoring, troubleshooting and network capacity planning. Reduce the time required to understand the root cause with automated detection, quick triage, predictive insights, and relevant suggestions for remedial actions.
Flowmon can be integrated with network access control, authentication, firewall, or other immediate incident response tools. Leverage fully documented and supported REST API to develop integrations and additional capabilities.
Flowmon has the broadest coverage of network visibility standards in the industry which means own sensors, flow technology support (NetFlow, IPFIX, sFlow, jFlow, cflowd, NetStream, all RFC flow formats) and cloud native FlowLogs support (Azure, AWS, Google Cloud Platform) including hybrid approach.
Flowmon solution can ingest data from various of sources - cloud (AWS, Azure, Google Cloud), firewalls, routers or switches, Progress LoadMaster (load balancer) no matter the producer of the device.
Flowmon leverages flow (IPFIX) technology, that stores small amount of data compared to traditional packet based solution, thus the solution can scale from SMB to large enterprise, without rapidly raising the cost.
"After three months of intensive testing we were able to prove that Flowmon was the right product due to its performance, anomaly detection capabilities, scalability in GÉANT and its simplicity when managing and configuring."
Virtual, cloud or hardware appliance providing highly scalable data storage and built-in analytics centre with configurable dashboards and reports.
Virtual, cloud or hardware appliance generating detailed data from network traffic.
The anomaly detection system protects against security threats and indicators of compromise hidden in network traffic.
Automated auditing tool that records and interprets captured full packet data.