Blog

Flowmon Blog Moved

By: Martin Skoda | Comments: 0

Flowmon Blog was moved to web flowmon.com. If you are interested in new features, use-cases and other blog posts, please visit https://www.flowmon.com/en/blog.

Thank You.

Tags: FlowMon
Category: Others

More info

Flowmon ADS & Cisco APIC-EM Integration

By: Martin Skoda | Comments: 1

In the end of year 2015 we announced new collaboration with Cisco. By integrating Flowmon Anomaly Detection System (ADS) with Cisco’s Application Policy Infrastructure Controller Enterprise Module (APIC-EM), the companies will provide administrators with agility when provisioning quality of service and executing security policies across the entire network. Check out how Flowmon ADS and Cisco APIC-EM overcome cyber threats and secure network infrastructure.
More info

External Storage Backup&Restore of Flowmon Profiles

By: Lubos Lunter | Comments: 0

A profile in context of Flowmon is a specific view on flow data stored in Flowmon Collector. It is defined by name, type, combination of profile filters and for a continuous type of the profile also size of allocated quota. Exceeding the quota causes an expiration of the oldest data, which is overwritten. A new feature allows to backup the profiles to defined external storage and restore them vice-versa whenever needed.
More info

Dynamic Baselining and Adaptive Threshold in DDoS Defender

By: Lubos Lunter | Comments: 0

Dynamic baselining allows to respond to increasing volumes of traffic based on adaptive thresholds and defined rules. Flowmon Networks has introduced DDoS Defender for DoS/DDoS detection and subsequent mitigation in May 2015. Since version 2.0 released on October 2015, Flowmon DDoS Defender monitors traffic volume characteristics based on adaptive thresholds.
More info

ISPs provide Security as a Service by Flowmon

By: Lubos Lunter | Comments: 0

Some of significant present cyber threats are the attacks targeting government or finance institutions to cut them off the Internet, penetrations into protected systems or malware earning money for its creators. Most of these attacks come from computers of unsuspecting users that are under control of attackers and are part of botnet. What if an ISP protects end customers and connectivity provider protects ISP against cyber threats including DoS/DDoS? Security as a Service via Flowmon solution drives win-win strategy for service providers as well as end customers. Relying on their service providers, they do not need to worry about advanced cyber threats anymore.
More info