Infrastructure Management

Explore by sub-topic:

P.com Flowmon Top Image Thumbnail
Threat Detection and Response: How Flowmon Detected an Attack in Real Time
January 27, 2025
This blog highlights how Progress Flowmon was instrumental in detecting a breach experienced by one of our customers.
Read Blog
Get the most out of the profiles in Flowmon Monitoring Center
Today we will learn the concept of profiles in Flowmon Monitoring Center and examples how to get the most out of them.
Success Story: East-West Traffic Visibility Enabled by Flowmon Probes
One of the largest banks in the world is using Flowmon thanks to probe’s wide L2 and tunneling protocols support including Overlay Transport Virtualization.
Crypto-jacking, Crypto-mining and Crypto-currency security
Earlier this year, news was reported about Slovak Telecom secretly injecting a crypto-mining script into a website that users accessed. This was all done, apparently, without the consent of Slovak Telecom - a member of Deutsche Telekom – users. Specifically, the mobile TV Magio Go website was used, running a script that resulted in maximum processor overload due to Monero crypto-mining.
Define Profiles Automatically Using Script
Creating profiles can be time consuming, especially in large and changing network infrastructures. Today we will show you how you can save your time using script to create profiles automatically.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation