Flowmon Helps to Train Next Generation Security Experts

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_heading heading=’Flowmon Helps to Train Next Generation Security Experts’ tag=’h2′ style=’blockquote modern-quote’ size=” subheading_active=” subheading_size=’15’ padding=’10’ color=” custom_font=”][/av_heading]

[av_textblock size=” font_color=” color=”]
With the modern day cyber threat constantly changing, it is of utmost importance for security teams to be sufficiently prepared to defend. We are glad to announce that Flowmon is proud partner of CyberKombat, an attack/defence experience training program designed to test and develop a security operations centre teams’ response to an incident. The whole story tells the official press release. Check out our latest news below.

► Where You Can Meet Flowmon Team in Late 2016?

When it comes to events, we try to be very active. Our team regularly attends key industry conferences and this fall it will be no different. Check out this listing to see where you can meet us.

► Inside the Heart of the Flowmon Solution: The Collector

Join Lubos Lunter, our product expert, at an upcoming webinar September 21, 2 PM (CEST), to learn how you can get complete network traffic visibility with powerful Flowmon Collector. Lubos will show you the key features and use cases beneficial for network engineers, security experts and application specialists.

► How to Analyse and Understand Your Network?

Are you new to network traffic monitoring? Learn the basics with the first part of our handbook on flow-based network monitoring. Download here.

► Success Story Bonatrans: Monitoring of Remote Locations

“Our priority was to gain a network traffic visibility not only in the main location, but also in the remote branches, where being physically present is much more difficult,” says Marek Hanzel, Head of IT at Bonatrans Group, in our latest success story.

Follow our latest news on Twitter, LinkedIn and Facebook.
[/av_textblock]

[/av_one_full]

Flowmon July News

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_textblock size=” font_color=” color=”]
Even when holidays knock on the door and temperatures rise, Flowmon doesn’t take a day off. Check out our latest news below.

► Webinar: Flowmon Probes, the Most Powerful Flow Data Exporters in the World

Join our LIVE technology webinar on August 17 to learn how you can benefit from managing your network with Flowmon Probes. Register here.

► Amstelland Hospital Manages its Network with Flowmon

“Formerly we called our network a Black Box because it was unclear what kind of traffic was under way,” said Wouter Kors, IT Architect of Amstelland Hospital. Read the whole story…

► New Alliance With Garland Technology

Thanks to the cooperation with Garland Technology, a network test access point (TAP) manufacturer, data center operators can utilize an absolute traffic visibility and 100% uptime guarantee when performing operational and security tasks by the Flowmon Solution. Learn more in the joint solution whitepaper.

► Flowmon Networks Announced as a CSI Awards Finalist

We are delighted to be shortlisted for the Best monitoring/network management solution category at this year’s CSI Awards. Winners will be announced on Friday 9 September 2016 at IBC in Amsterdam. Keep your fingers crossed :-).

Follow our latest news on Twitter, LinkedIn and Facebook.
[/av_textblock]

[/av_one_full]

Does Proactive Monitoring Really Matter?

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_heading tag=’h2′ padding=’10’ heading=’Does Proactive Monitoring Really Matter?’ color=” style=’blockquote modern-quote’ custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=” font_color=” color=”]
does-proactive-monitoring-really-matterYou bet. On average, businesses are losing R84,000 for every minute of unplanned network downtime (Gartner). That’s well over R4.5M every hour. How long does it take your IT team to find and fix issues?

The issue that grinds your business to a halt could be an application or server issue, an unknown virus, a BOT or DDoS attack a disgruntled employee wanting revenge or simply an unknown event that disrupts the network and magically disappears. What can be done to prevent or at least detect these many diverse, unusual and challenging issues?

Things to consider:

Dynamic Network Mapping – See who is up, who’s down, response times, etc Mapping the network and drilling down to maps of specific locations and connections allows us to quickly pinpoint issues. If a router in Cape Town is acting up, you can instantly see the problem, where it is located, the impact it can have on the network, and what we need to do to fix the issue.”

Anomaly Detection – Detect any abnormal activity on the network, Worms, Virus’s, DDoS attacks, repeat password attempts, high or low bandwidth usage, data seepage, abnormal response times, unknown or unauthorized IP addresses, in fact anything that is not normal. Most companies rely on legacy IT systems, consisting of perimeter security and endpoint protection. However, they dismiss the significant infrastructure located between these two areas. In the world where threats have more opportunities than ever to bypass traditional solutions and sneak in, where 70% of attacks come from an internal network, this approach is not enough anymore. How do you secure your systems and data from sophisticated, ever changing threats that are undetectable by traditional solutions?

Application Performance Monitoring

Applications are usually the only part of the IT environment visible to the end users. So that ensuring a high quality user experience is crucial for application-driven business. For years, transaction simulations and software agents on servers were only resource demanding ways how to achieve this. Network traffic monitoring proves that there is a better way how to identify and resolve performance issues and enhance user experience.

Network Traffic Monitoring

Do you know who communicates with whom, when, how long and how often in your network? Flow based monitoring, NetFlow, IPFIX, sFlow, jFlow, etc have been developed to provide these answers and manage corporate infrastructure with confidence. By using Flow based analysis, administrators get an instant insight into network traffic structure to check its utilization, to find stations most loading the crucial connections, to plan capacity properly or control QoS.

All of the above functions are available in one product, FlowMon from Invea, developed for GÉANT in Europe linking most of the research institutions and universities and hosting over 65 million users FlowMon is the most powerful Network Monitoring and Security tool available and is used by many Government agencies, Police and Military organizations, worldwide. Now available in South Africa from Soba Vigor.
[/av_textblock]

[av_button_big label=’Contact Us to arrange a free trial’ description_pos=’below’ link=’page,49′ link_target=” icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ custom_font=’#ffffff’ color=’theme-color’ custom_bg=’#444444′ color_hover=’theme-color-subtle’ custom_bg_hover=’#444444′][/av_button_big]

[/av_one_full]

FlowMon solution for ISP

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_heading tag=’h2′ padding=’10’ heading=’FlowMon solution for ISP ‘ color=” style=’blockquote modern-quote’ custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=” font_color=” color=”]
FlowMon is comprehensive solution for monitoring of network infrastructure, based on an observation of IP data flow (NetFlow/IPFIX). The technology provides overall view of network traffic within fixed, mobile or cloud infrastructure, details of every single communication as well as details about who, where, for how long, how often, using which protocol and which service, or amounts of data transferred during the communication. FlowMon is the only European solution using Network Behavioral Analysis (NBA) as identified by analytical agency Gartner.

The solution consists of powerful dedicated probes, collectors and NBA based module ADS (Anomaly Detection System), which detects both known and unknown security threats (attacks on network services, infected hosts, network traffic anomalies etc.). FlowMon solution may be extended by additional modules such as DR (Data Retention) to fulfill governmental law requirements not only in Czech Republic. Furthermore it is module TR (Traffic Recorder), recording chosen portion of traffic, including contain of packets.

flowmon-icon1Flow Monitoring – Next Generation Network Monitoring (NetFlow/IPFIX)

flowmon-icon2Network Behavior Analysis – Next Generation Network Security (NBA, NBAD)

flowmon-icon3IP Data Retention for ISP – governmental law fulfillment

flowmon-icon4FlowMon Traffic Recorder – recording of whole network traffic (L2-L7)

As of today, internet service providers require solution of a new generation, which provides faster and more comprehensive overview of network traffic and security of both their networks and their customer networks. Width of bandwidths is growing as well – from 10Gbps, 40Gbps, 80Gbps up to 100Gbps and the only solution delivering overall network monitoring is IP flow monitoring.
[/av_textblock]
[/av_one_full]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_heading tag=’h2′ padding=’10’ heading=’Benefits of FlowMon for ISP ‘ color=” style=’blockquote modern-quote’ custom_font=” size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_textblock size=” font_color=” color=”]

  • Real-time network traffic monitoring, improvement of security and detection external and internal threats, analysis long-term statistics including details about computers, applications and conversations, detailed monitoring of users and services, effective bandwidth capacity management.
  • Long-term storage of network traffic statistics – law fulfillment.
  • Quick, efficient and accurate network operational troubleshooting, identification of any kind of anomalies using automated alerting.
  • Clear statements about network traffic, QoS monitoring, easier planning of infrastructure upgrades, peering control and supervision over the quality of service (SLA) are available thanks to qualified reporting.
  • Monitoring and detection of anomalies within VoIP traffic (SIP).
  • Detection of specific application usage based on NBAR2 standard.
  • Optimization of peering policies, compliance and SLA monitoring.
  • Monitoring of IP flows between BGP and autonomic systems (AS).
  • Monitoring of kind of traffic comes in or goes out within the network of operator.
  • Verification whether the load of load balancers works according to the proposed rules.
  • Thanks to the long-term statistics is the status/performance ratio of the network comparable before and after the upgrade of network elements
  • FlowMon provides information about the transmitted data or bandwidth to the FlowMon operator based on which operator is able to charge its service to customers

[/av_textblock]

[av_image src=’https://www.sobavigor.co.za/wp-content/uploads/2016/10/Flowmon-icon5.jpg’ attachment=’151′ attachment_size=’full’ align=’center’ styling=” hover=” link=” target=” caption=” font_size=” appearance=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’][/av_image]

[av_textblock size=” font_color=” color=”]
FlowMon solution detects anomalies or security incidents during the occurrence on the network thanks to ADS module. Through a collector the data is stored for the required period (for tracing incidents or forensic analysis). The whole solution can be fully integrated into SIEM solutions (Syslog, CEF).

Detection of these events:

  • Attacks (port scanning, dictionary attacks, DoS, Telnet)
  • Network traffic anomalies (DNS, multicast, high variability of communication)
  • Anomaly behavior of IP addresses (change in behavior profile)
  • Malware (viruses, spyware, botnets, communication with blacklisted addresses)
  • Mail (outgoing SPAM, illegitimate mail servers)
  • Operation problems (delay, overcapacity, reverse DNS records, service outages)

[/av_textblock]

[av_button_big label=’Further Information Contact Us’ description_pos=’below’ link=’page,49′ link_target=” icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ custom_font=’#ffffff’ color=’theme-color’ custom_bg=’#444444′ color_hover=’theme-color-subtle’ custom_bg_hover=’#444444′][/av_button_big]

[/av_one_full]