Infrastructure Management

Explore by sub-topic:

P.com Flowmon Top Image Thumbnail
Threat Detection and Response: How Flowmon Detected an Attack in Real Time
January 27, 2025
This blog highlights how Progress Flowmon was instrumental in detecting a breach experienced by one of our customers.
Read Blog
Validate Indicators of Compromise in Your Network
You may have recently come across indicators of compromise (IoC), such as malicious IP addresses, which you can use to validate whether you have been affected or not. For example, a national cyber security agency can approach you to validate specific IoCs in your environment and report back to them. Flowmon can help you with this. You can simply do a retrospective analysis and proactive real-time monitoring to detect the occurrence of such IoCs.
Network Traffic Monitoring with and without Encrypted Traffic Visibility
Having or not having an encrypted traffic analysis feature in your network monitoring system makes a huge difference.
Emotet Malware: Email Spoofer Awakening
According to IBM X-Force, the Emotet malware has recently been spreading in Germany and Japan, targeting companies in the area more and more aggressively.
5 Reasons Why Hackers Will Have a Bumper Harvest
In the coming years we can expect an even larger and more sophisticated wave of theft, fraud, extortion and deactivation of the various services run by businesses and public organisations. Here are a few reasons cybercrime will flourish in the coming years.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation