Operations | Monitoring | ITSM | DevOps | Cloud

Flowmon

What is MITRE ATT&CK and How to Use the Framework?

The MITRE ATT@CK® framework is one of the most widely known and used. The Flowmon Anomaly Detection System (ADS) incorporates knowledge of the MITRE ATT&CK framework. Using ADS and its MITRE ATT&CK knowledge makes detecting advanced threats against networks and IT systems easier and simplifies explaining the danger and risks when outlining an attack to all stakeholders.

CISO's MOST WANTED: Outsmarting Cyber Criminals with Tips from a Former FBI Agent

It's not a matter of IF you’ll be hacked, it’s a matter of when. No one understands that more than FBI Special Agent, Scott Augenbaum, who spent 30 years as a Supervising Agent for the FBI’s Cyber Crimes Unit. Scott joins our panel of experts to discuss today’s cyber threats and practical security solutions to keep you one step ahead of cyber criminals.

Enhancing Security Workflows with Real-Time Notifications via Microsoft Teams and Slack

The integration with popular collaboration platforms like Microsoft Teams and Slack marks a pivotal advancement in security workflows. We are introducing new capability to post events from Flowmon ADS into Teams channel or Slack to instantly notify security teams. Integrations scripts are based on simple webhooks and available out of the box on our support portal both for Teams and Slack.

The First 48 Hours of Ransomware Incident Response

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives, so let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

Hybrid Cloud Monitoring and Performance Management

Many organizations manage a hybrid infrastructure spread over on-premise and multiple public cloud platforms such as AWS, Azure and Google for specific business applications. The hybrid cloud approach has advantages but adds more complexity for IT teams responsible for keeping IT systems safe and secure. The monitoring tools system administrators use for on-premise infrastructure are often unsuitable for monitoring public cloud platforms.

Applying Zero Trust to Data Centre Networks

Zero trust isn’t an approach that can be delivered by buying a single product that claims to provide it. Instead, it is an approach that needs to be understood and implemented in complementary ways across an organization’s IT systems. We recently hosted a webinar titled Applying Zero Trust to Data Centre Networks to provide guidance on how organizations can use zero trust to enhance the security of their IT systems. The webinar details are below, after a summary of the topics covered.

Multi-Cloud - Rise of Hybrid Networks and the Need to Monitor & Secure Them

This model has benefits, but at the same time, it introduces complexity for the IT teams tasked with monitoring and securing IT systems. Existing network monitoring technologies that system admins use with on-premise infrastructure are typically not expandable to include infrastructure and services running on public cloud platforms. This is a problem as you cannot manage and secure what you cannot see.

Flowmon Integrations into Enterprise Ecosystem

Flowmon is not a stand-alone system used in isolation. It is part of an ecosystem of monitoring and security tools used across the enterprise. Recently, we have introduced new integrations with Splunk and ServiceNow to simplify interoperability and enable IT and security teams to be more efficient. This is a good opportunity to remind of all the integration options and resources we have.