Flowmon

1200x620 Image
What’s New in Progress Flowmon ADS 12.5
May 28, 2025
Progress is pleased to announce that we have updated our industry-leading Flowmon Anomaly Detection System (ADS) to version 12.5.
Read Blog
The Upsurge of Home Office: Best Practices to Keep Your Network Secure and Running
Just like many companies in these trying times, we too have asked many of our employees to work from home to protect their health. As a consequence of this decision, our network traffic characteristics have changed dramatically. This change comes with a variety of associated operational and security challenges.
Validate Indicators of Compromise in Your Network
You may have recently come across indicators of compromise (IoC), such as malicious IP addresses, which you can use to validate whether you have been affected or not. For example, a national cyber security agency can approach you to validate specific IoCs in your environment and report back to them. Flowmon can help you with this. You can simply do a retrospective analysis and proactive real-time monitoring to detect the occurrence of such IoCs.
Network Traffic Monitoring with and without Encrypted Traffic Visibility
Having or not having an encrypted traffic analysis feature in your network monitoring system makes a huge difference.
Emotet Malware: Email Spoofer Awakening
According to IBM X-Force, the Emotet malware has recently been spreading in Germany and Japan, targeting companies in the area more and more aggressively.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation