Tag: flowmon

Progress Flowmon Monitoring for Kubernetes Applications
From the perspective of network administrator and operator, the fundamental requirements for network applications are the same regardless of the environment they are running in. They need to have their network communication fast, reliable and secure. To meet these requirements, we need to have relevant data about the application traffic. For this purpose, the flow data from Progress Flowmon Probes fits greatly with a slight difference in comparison to the flows generated in a standard network. It is necessary to correlate the flow data with particular network applications or services running in Kubernetes (k8s). For this purpose, we use k8s metadata rather than relying on IP addresses, as pods are regularly created and destroyed meaning that the traffic for a specific application can be made up of many different IPs in a short period of time. It's also likely that the same IP address will be associated with multiple applications in a limited period of time.
Streamline Incident Analysis in QRadar by Using the Progress Flowmon QRadar Application
Flowmon QRadar integration provides a single pane of glass to detect and respond to Flowmon ADS events directly in IBM QRadar. The integration packages were updated to support the latest version of Flowmon products and the IBM QRadar platform.
Detecting Cryptojacking with Progress Flowmon
In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.
The Role of Artificial Intelligence (AI) in Digital Transformation
In today's fast-paced digital landscape, it's not enough for companies to merely adapt to change; they must lead the way in embracing transformative technologies because it’s the only way to grow and stay competitive. In this blog, we'll explore how the fusion of digital transformation and AI transformation is shaping business environments around us.
After a Ransomware Infection – Enhancing Security for Your Infrastructure Against Further Intrusion
In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation