Infrastructure Management

Explore by sub-topic:

P.com Flowmon Top Image Thumbnail
Threat Detection and Response: How Flowmon Detected an Attack in Real Time
January 27, 2025
This blog highlights how Progress Flowmon was instrumental in detecting a breach experienced by one of our customers.
Read Blog
Using Behavior Patterns to Detect Rising Threats
We witnessed an unprecedented global outbreak of WannaCry infection last week. Let’s examine how one can detect and minimize the impact of WannaCry as well as other rising threats with the new feature in Flowmon ADS module.
Flowmon Sales Training: The Making of
Some people educate themselves because they are personally interested in the topic. For some, education is compulsory while others are just looking for a better qualification. The best way we can share our experience from selling Flowmon with you is through training and workshops. A video session of a few hours should be better fun to watch though and with this idea in mind we decided to create a whole new type of experience for you. This is how we made it.
Reasons not to worry about GDPR and NIS
Brace Yourselves for the new European legislation on data and network security coming soon! Get ready to invest millions in technologies and hire dozens of new employees. The whole world as we know it will never be the same again.
Network visibility in the SCADA/ICS environment
Security in the SCADA/ICS environment is a much discussed topic today. In the past these systems were strictly separated. But their connection to common computer networks has opened new opportunities for attackers. How the network visibility combined with real-time anomaly detection helps to protect SCADA/ICS environments?

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation