Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

CISO's MOST WANTED: Outsmarting Cyber Criminals with Tips from a Former FBI Agent

It's not a matter of IF you’ll be hacked, it’s a matter of when. No one understands that more than FBI Special Agent, Scott Augenbaum, who spent 30 years as a Supervising Agent for the FBI’s Cyber Crimes Unit. Scott joins our panel of experts to discuss today’s cyber threats and practical security solutions to keep you one step ahead of cyber criminals.

The First 48 Hours of Ransomware Incident Response

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives, so let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

Flowmon: How to Choose a Network Observability Platform

Individual EU Member States are expected to transpose the NIS2 and RCE directives into national What are the key characteristics organisations should have to shift from network monitoring to network observability? The need is to have more of a platform approach. Let´s see how to choose a Network Observability Platform to succesfully manage the networks in highly distributed environments.

How to Comply with Current EU Regulations NIS2 & RCE

Individual EU Member States are expected to transpose the NIS2 and RCE directives into national legislation. It will concern not only critical, essential and important entities, but also National Security Authorities and various accredited CSIRTs. In this webinar, we discuss important milestones, individual measures and obligations, and the capabilities of the Flowmon solution, which can help organisations comply with directives and paragraphs of Cyber Security Acts, especially in the area of risk-management measures, network security monitoring and incident reporting.

Flowmon Solution Overview

Discover all capabilities of Flowmon Network Detection and Response (NDR) and Network Performance Monitoring and Diagnostics (NPMD). Flowmon analysis. In a world where technology exists for the benefit of people, secure and healthy digital environments are essential. That’s why Flowmon Networks develops an actionable network intelligence solution that enables businesses to ensure their services are running well and securely, and their workforce is productive.

Protect Data from Ransomware with Flowmon & Superna

With the rapid rise of ransomware in the recent years, protecting your data is now crucial than ever. Combination of Flowmon' Anomaly Detection System (Flowmon ADS) to provide early warning about upcoming attacks and Superna's capability of taking proactive snapshot of data is a powerful combo to protect your data before any exfiltration attempt.