Protect Your Network Against Modern Threats and DDoS Attacks

Traditional solutions such as firewall, antivirus or IDS systems are undoubtedly the basis of modern cyber security. But they can only protect the infrastructure against known threats and leave a gap for advanced ones designed to penetrate this kind of protection. Flowmon utilizes advanced network monitoring technology to fill the gaps left by other protection tools and helps security engineers to keep business wealth safe.

Launch demo

Minimize the risks in your network

Flowmon solution consists of high-performance flow statistics generating probes for the monitoring of all types of networks up to 100 Gbps, powerful collectors to display and analyse network traffic and advanced security modules. The network traffic is monitored with Kemp Flowmon Probes, and the collected data is evaluated by sophisticated Flowmon Threat Intelligence using behavior analysis and methods detecting security risks. Security Engineers receive reports of the security risks in their network (detected attacks against computers in the customer network, scanning computers, spam generation, etc.), enabling

them to react promptly and minimize their impact on users. Also, Kemp Flowmon Collector can be equipped with the DDoS Defender module that continuously observes and profiles volumetric characteristics of network traffic to create and maintain dynamic baselines to detect DDoS attacks. Security Engineers pre-configure actions triggered in case of an unexpected increase of network traffic, including alerting (e-mail, syslog, SNMP trap), traffic diversion (policy based routing, border gateway protocol, remotely triggered black hole), execution of scripts or mitigation through the specific out-of-band DDoS mitigation system.

DDoS Defender notify security engineers about:

  • Infected nodes in the network
  • Dictionary attacks to guess a username/password
  • Increased use of network services
  • Sending or attempting to send SPAM
  • Devices in the network attacking the internet
  • Suspicious communication in DNS traffic
  • Communication with botnet command and control centers
  • DoS/DDoS attacks

"After three months of intensive testing we were able to prove that Flowmon was the right product due to its performance, anomaly detection capabilities, scalability in GÉANT and its simplicity when managing and configuring."

Wayne Routly

Head of Information & Infrastructure Security


Request free trial

Get no-obligation 30-day trial of Flowmon in your network.
Get your trial today

See live product demo

Explore a fully interactive product demo and see what issues it can tackle for you.
Launch demo