Infrastructure Management

Explore by sub-topic:

flowmon-default-blog-top-1200x620 Thumbnail
New Flowmon DDoS Defender - Straightforward Performance
November 25, 2019
The new Flowmon DDoS Defender 5.0 is faster, more precise and better-looking. It combines powerful and highly customizable attack detection with an intuitive user interface, turning DDoS protection into a smooth and satisfying experience.
Read Blog
Monitoring the Health Status of Progress Flowmon Appliances with IT Infrastructure Monitoring Tools
Progress Flowmon is a core network monitoring and security tool. Confirming if it is up and running can mean the difference between responding to a data breach or overlooking such a critical event. Like any other critical system, it is a good practice to include the monitoring of Flowmon uptime, resource consumption and health in an IT infrastructure monitoring (ITIM) dashboard, such as Progress WhatsUp Gold. Like many other ITIM tools, WhatsUp Gold provides various remote monitoring capabilities, such as SNMP, SSH or REST API-based "active" (WhatsUp Gold initiated) monitors or "passive" (Flowmon-initiated) Syslog monitoring. Depending on your environment size, either the WhatsUp Gold Free edition (for smaller deployments) or a commercially licensed version (for larger environments) would suffice.
After a Ransomware Infection – Enhancing Security for Your Infrastructure Against Further Intrusion
In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage.
Application-down Troubleshooting Through the Eyes of a Network Engineer
Imagine yourself wearing the hat of a network engineer, where no two days at work are alike. In this dynamic environment, you're often the first point of contact when something remotely IT-related goes wrong, with users frequently pointing fingers at the network. Yet, your expertise lies in knowing the intricacies of network traffic, a vital skill for addressing operational and performance challenges.
Beyond Traditional Defenses: Integrating IDS and NDR for Improved Detection Capabilities
AI-powered Network Detection and Response (NDR) solutions have become a staple for identifying the subtle indicators of unknown threats, a crucial element in the constant battle against cyberattacks. While NDR excels in unveiling the shadows of the unfamiliar, it is the traditional signature-based Intrusion Detection Systems (IDS) enabling security teams to maximize protection and facilitate targeted responses, particularly when confronting well-known malware. In this article, we delve into the distinct benefits of both AI-driven NDR and conventional approaches. We will also unravel compelling reasons why the integration of these technologies are strategic imperatives in assisting to fortify cybersecurity defenses.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation