Flowmon

Brno, Czech Republic
2007
  |  By Filip Cerny
There is no escaping the discussion about how machine learning (ML) and AI systems will revolutionize how people and industries work. Most of this discussion needs to be revised, as companies are still evaluating how AI systems (typically Large Language Model (LLM) systems like OpenAI ChatGPT, Google Gemini, Anthropic Claude and others) enhance worker productivity and deliver business benefits. Cybersecurity is one sector where extensive use of AI-enhanced solutions is common.
  |  By Filip Cerny
Progress Flowmon 12.4 addresses the challenges in understanding the need for faster and more efficient data analysis. At Progress, our primary focus is to provide accurate and thorough network data insights to our customers. As our customers' networks grow, the volume of telemetry data expands exponentially. This growth, while beneficial, brings with it the challenge of increasingly longer search times through vast amounts of data.
  |  By Martin Škoda
In today’s rapidly evolving cyberthreat landscape, organizations require network detection solutions that help identify and mitigate threats before significant damage happens. Among the options available on the Network Detection and Response (NDR) market, Progress Flowmon Anomaly Detection System (ADS) stands out for its unparalleled ability to detect threats throughout every stage of an attack.
  |  By Filip Cerny
This blog explores each acronym for those hearing them for the first time and for professionals who’d like to brush up on them.
  |  By Nick Vlasov
Artificial intelligence (AI) is seemingly everywhere in today’s tech landscape. The hype cycle is in full flow, especially regarding the use of large language models (LLM) for generative AI like OpenAI ChatGPT, Google Gemini and Anthropic Claude. Indeed, many tech companies are determined to add LLM into products where it sometimes seems tacked on.
  |  By Filip Cerny
IT professionals seek out solutions that provide in-depth visibility into their networks and streamline processes so they can more efficiently catch anomalies. A recent update to Progress Flowmon Anomaly Detection System (ADS) will address these concerns our customers have. This blog gives you the first look into how Flowmon ADS 12.3 improves your organization’s threat analyses and cybersecurity strategies.
  |  By Nick Vlasov
The new partnership between Progress and Veeam represents a significant step forward in cybersecurity. It marks a considerable advancement in data protection by merging the Flowmon AI-powered threat detection capabilities with the robust backup solution of Veeam. This empowers organizations to more effectively defend their invaluable digital assets.
  |  By Robert Balzer
Progress Flowmon is a core network monitoring and security tool. Confirming if it is up and running can mean the difference between responding to a data breach or overlooking such a critical event. Like any other critical system, it is a good practice to include the monitoring of Flowmon uptime, resource consumption and health in an IT infrastructure monitoring (ITIM) dashboard, such as Progress WhatsUp Gold.
  |  By Artur Kane
AI-powered Network Detection and Response (NDR) solutions have become a staple for identifying the subtle indicators of unknown threats, a crucial element in the constant battle against cyberattacks. While NDR excels in unveiling the shadows of the unfamiliar, it is the traditional signature-based Intrusion Detection Systems (IDS) enabling security teams to maximize protection and facilitate targeted responses, particularly when confronting well-known malware.
  |  By Jan Pazdera
From the perspective of network administrator and operator, the fundamental requirements for network applications are the same regardless of the environment they are running in. They need to have their network communication fast, reliable and secure. To meet these requirements, we need to have relevant data about the application traffic.
  |  By Flowmon
Network traffic analysis is crucial for maintaining the health and security of your network infrastructure. However, addressing challenging issues related to packet capture and analysis can be daunting, especially if you lack deep knowledge of network protocols. This webinar is designed to help you overcome these challenges with the powerful capabilities of Flowmon.
  |  By Flowmon
Our webinar, Network Detection Response (NDR) Explained will unravel the complexities of this technology and highlight its critical importance in today's cybersecurity landscape. Progress Flowmon product experts will guide you through the historical evolution of NDR technologies. Additionally, you will learn how NDR.
  |  By Flowmon
Your CISO’s top priority is to fortify your organization's security posture by closing vulnerabilities, disrupting attack chains and bolstering defenses. Yet, the challenge lies in harmonizing disparate security solutions across your organization’s network to develop a unified and proactive defense strategy.
  |  By Flowmon
This webinar explores the critical role network observability plays in hybrid-cloud environments and the multifaceted benefits it provides.
  |  By Flowmon
Leverage Progress Flowmon and Dell PowerScale integration to detect threat actor presence early and to respond by prohibiting access to the data stored on PowerScale.
  |  By Flowmon
Gain insights into how Dell ECS and Progress Flowmon partnership enhances performance and enables quick root cause analysis. Watch now for a short demo example for practical insights.
  |  By Flowmon
Imagine having an AI-powered network security analyst at your fingertips, tirelessly monitoring your network 24/7, analysing traffic patterns and identifying potential threats in real-time. That's what Flowmon delivers. Explore it yourself with our online demo!
  |  By Flowmon
Introducing Flowmon, a cutting-edge solution that revolutionises network security with the power of artificial intelligence.
  |  By Flowmon
Watch the webinar and learn how to: Refine your workflows based on different perspectives Simplify your incident responses by creating more thorough drilldowns of your infrastructure Inform your team of threats based on robust insights and information.
  |  By Flowmon
Flowmon is like having an AI-powered network security analyst joining your team, tirelessly monitoring your network 24/7, analysing traffic patterns and identifying potential threats in real time to help alert you in early attack stages. The solution distils thousands of alerts into a few security incidents intelligently prioritises critical events, providing real-time insights and actionable intelligence for shortening the time to investigate attacks and automate response.
  |  By Flowmon
Learn more about the technical background of Flowmon Enriched Flow Data technology, which enables you to resolve 95% of all troubleshooting cases. Together with on-demand packet capture, Flowmon is an all-in-one platform to successfully monitor and manage your network.
  |  By Flowmon
The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?
  |  By Flowmon
Encryption is considered as security by design. It undoubtedly helps to avoid risks such as communication interception and misuse. Therefore it is natural that all responsible organizations adopt encryption as an important way of protecting business critical applications and services. According to Gartner 80 % of web traffic will be encrypted in 2019.
  |  By Flowmon
It has been estimated that encrypted traffic provides the cover for almost half of today's cyber-attacks. The concerted, blended, always-morphing and never-ending character of network-borne attacks masked by encryption demands a response in kind.

The Flowmon solution creates a secure and transparent digital environment where people rule the network regardless of its complexity and nature. Using machine learning, heuristics and advanced analytics, it enables IT professionals to improve performance and reduce risk across on-premise, datacenter and cloud environments. The solution serves as a shared platform where network and security teams speak the same language, enabling them to work as one for faster mean-time-to-resolve and optimal resource allocation. By delivering highly streamlined deployment to any network type, market-leading support and in-product guidance, the solution provides the fastest time-to-value in the industry.

Unified Digital Performance and Security Solution for:

  • NetFlow/IPFIX Monitoring: The Flowmon appliance captures, stores and processes network telemetry data, including normalization, visualization and analysis.
  • Network detection and response to cyber threats​: Flowmon detect suspicious behaviours, insider threats, unknown threats and other risks that bypass traditional approaches
  • Network Performance Monitoring and Diagnostics across on-premise, cloud and hybrid environments.
  • End-User Experience Monitoring: SaaS, cloud or on-premise, monitor critical app performance unobtrusively and at zero cost in resources. Let applications work for you.
  • Infrastructure Design & Deployment: Understanding traffic structure is how you fine-tune your network configuration.
  • Incident Monitoring & Investigation: Get a clear understanding of relevant events and their circumstances.
  • Encrypted Traffic Analysis: No decryption. Get your complete analytics in real-time without losing privacy.