Operations | Monitoring | ITSM | DevOps | Cloud

Flowmon

The First 48 Hours of Ransomeware Incident Response On-Demand Webinar

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives. In this on-demand webinar we’ll let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

What is Zero Trust and How IT Infrastructure Monitoring (ITIM) Makes it Happen

When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.

Ask Me Anything WhatsUp Gold and Flowmon Integration

Watch the Ask Me Anything: WhatsUp Gold and Flowmon Integration webinar where you will learn how to leverage Flowmon’s NPMD/NDR within WhatsUp Gold to view details about your traffic analysis through the same interface you use to monitor your infrastructure. We’ll discuss the benefits of the integration and how fewer tools means better MTTR, more efficiency, and better/faster diagnosis for your business.

Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Public Companies To Comply

The much-anticipated cybersecurity rules by the U.S. Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks.

What's New in Flowmon 12.3 Release

New release offers exciting new features such as new navigation menu and visual comparison of historical trends. Flowmon ADS 12.2 brings new IDS event visualisation, AI-assisted analysis, Threat Score, Additional insight into Application and platform and more. In this webinar product experts Martin Skoda and Filip Cerny will showcase new workflows and improvements in user experience that Flowmon 12.3 and Flowmon ADS 12.2 brings in live demonstration.

Augmenting behavior-based network detection with signature-based methods

Network detection tools utilize one of two prominent approaches for threat detection: AI-driven behavior-based methods capable of identifying early indicators of compromise, and signature-based ones, which flag known attacks and common CVEs. While these systems operate on distinct principles, their combination forms more robust defense mechanism, helps to consolidate tools, provides richer threat context and improves compliance.

Monitoring TLS Network Traffic for Non-FIPS Compliant Cipher Suites

FIPS compliant cipher suites hold the U.S. government's seal of approval, guaranteeing their suitability for federal systems. On the other hand, non-FIPS compliant cipher suites may present security vulnerabilities due to outdated cryptographic algorithms and potential lack of perfect forward secrecy. As a result, it becomes paramount to monitor TLS network traffic for non-FIPS compliant cipher suites.