Newsletter

 

For a Free Quote...

Flowmon - Netflow Monitoring and Security Solution

Solution for Network and Cloud Operations Use Cases

1 face

End-User Experience Monitoring

Identify bottlenecks and resolve latency issues caused by networks, servers and applications. Measure fault, performance and availability of your local, hosted or SaaS applications.

1 face

Network Monitoring and Visibility

Flow provides visibility into traffic structure to streamline decision making and save costs on Network Operations.

1 face

Remote Work Monitoring

When a large number of users try to access company resources from home, they have to pass through a bottleneck at the business-internet edge. A situation like this is a recipe for traffic congestion, which naturally needs resolving, but the question is how.

1 face

Cloud Application Performance

Don’t lose network visibility when migrating network infrastructure to the cloud. Integrate with public cloud providers and 3rd party vendors to bring full-feature NPMD solution available in the cloud.

1 face

SaaS Performance Monitoring

Monitor latency between your corporate site and SaaS applications such as Office 365, Salesforce and Google Apps.

1 face

NetFlow / IPFIX Monitoring

The Flowmon Solution is capable of generation and monitoring of NetFlow/IPFIX and leverages the NetFlow technology to provide deep network visibility. Multiple Flow formats supported.

1 face

Single Source of Truth

Let your IT teams collaborate to lower MTTR. Flowmon stores statistics about every network communication with no sampling, no aggregation. One source of truth about the root-cause, affected services and users, denoting which team is responsible for remediation.

1 face

Advanced Reporting

Stay ahead of network incidents. Use off-the-shelf overviews or tailor them to your needs. Share data between IT teams easily. Get alerted on performance and bandwidth utilisation to your email, ticketing and log management system.

1 face

Network Troubleshooting and Forensic

Streamline root-cause analysis with powerful analytics. User friendly statistics, overviews and intuitive drill-down workflow is available for any communication in your network.

1 face

Network Forecasting and Capacity Planning

Take decisive actions with a detailed awareness of your network needs. Flowmon automatically collects, sorts and visualises network utilisation data. With both real-time statistics and history track, you always know what capacity your infrastructure and servers need.

Try them in an Online Demo

1 face

Compliance Enforcement

With hard traffic data you can detect goofs, rougue users, poorly configured systems and other risks that pose a threat to business continuity.

1 face

LAN/WAN Monitoring

Tune your network performance to its finest with a centralised dashboard. Monitor user activity within different subnets and VLANs, track connectivity, latency and QoS. Get comprehensive east-west visibility, identify different applications and track user transactions traversing LAN/WAN.

1 face

Application and Network Latency

Distinguish between latency caused by server and network. You always see which users are affected and resolve the problem before it impacts your business. Measure fault, performance and availability of your local, hosted or SaaS applications.

1 face

BYOD and Active Devices

Ensure capacity, compliance and security requirements by understanding who connects to your corporate network, what devices they use, what applications they use and how they utilise your infrastructure.

1 face

Historical Data Tracking & Data Retention

Track historical data to learn about trends. Store data for weeks, months or even years. NetFlow records offer aggregation rate of 500:1 compare to storing of full packet traces.

Solution for Security Operations Use Cases

1 face

Network Anomaly Detection and Network Behavior Analysis

Automate detection of operational and security anomalies in your network. Stop cyber risks that overcome perimeter or end-point protection.

1 face

Unknown Threat Detection

Based on dynamic learning your business behaviour patterns and data flows analytics, Flowmon uncovers malicious activity and helps to stop malware spreading throughout your organisation.

1 face

Encrypted Traffic Analysis

Visibility into SSL/TLS handshake allows analysing, reporting and alerting on compliance of cipher suites, certificates, lengths of the keys, etc, without the need of decryption.

1 face

Ransomware Detection

Ransomware is one of the most common, and yet scariest, online assaults. It is a type of malicious attacker activity or a code designed to deny access to data and systems and demanding payments for restoring access to them.

1 face

Seamless Integration with SIEM

Report detected events via integration with SIEM systems, surveillance and incident handling systems. QRadar integration is available via native Flowmon app, REST API and syslog.

1 face

Malware Detection

Signature-less detection methods based on machine learning continuously observe traffic, learn behaviour patterns and alerts on malicious activity.

1 face

Automated Incident Response

Integrate Flowmon with firewalls and SDN controllers to fully automate the reaction to a security incident. Or just script your own mitigation scenario to be triggered when a security event occurs.

1 face

Detection of Insider Threats

Early detection handled by advanced behaviour analycs engine, automated alerting and even retrospective data for forensics help to cope with botnets, data breaches, malware and privilege misuse.

Try them in an Online Demo

1 face

Unwanted Applications

Enforce your compliance policies on applications. Get alerts on undesired VPN, anonymisation services, BITTORRENT downloads, and more.

1 face

Early Detection of Ransomware

Take advantage of a leading behaviour analytics system in situations when every minute counts. If a specific threat is detected, just set your own behaviour pattern and mitigate damage.

1 face

User-defined Behaviour Patterns

Customise and extend detection capabilities of the system by using provided syntax to search over flow data including L7 information for specific behaviour patterns. Events detected by custom methods are processed the same way as other events and the same concepts are applied (reporting, alerting and more).

1 face

BYOD Policies Enforcement

Manage BYOD risks to your infrastructure. Alerts on permitted OS version, HW vendors, suspicious utilisation of the infrastructure helps you to keep BYOD compliance and deliver flexibility your users need.

1 face

Crypto Mining Detection

Detect and stop crypto mining on your network. By using behaviour patterns and advanced analytics, Flowmon detects and stops crypto mining software.

1 face

Detection of Botnets

Defeat botnets by detecting their natural behaviour. Flowmon's machine learning algorithms detect unusual network traffic, pinpointing the C&C communication and attacks led from your infrastructure.

Solution for DDoS Protection Use Cases

1 face

Automated DDoS Protection for ISPs

Learn more about flow-based DDoS protection for high-speed networks.

1 face

DDoS Protection as a Service

Protect your customers from volumetric DDoS attacks. Flowmon fits the needs of MSPs and ISPs who want to broaden the service portfolio with DDoS protection. Virtual platforms allow to start with low costs and scale up with your needs.

1 face

Volumetric DDoS Protection

Protection of high-speed networks and a successful mitigation of DDoS attacks is one of the key challenges for ISPs. When the attack reaches its target, it is too late for any effective resolution on their side. Timely detection is therefore paramount, and instant steps must be taken to save the network from overloading. Flowmon DDoS Defender can help with volumetric DDoS attacks.

1 face

DDoS Mitigation Using BGP Flowspec

Finetune your DDoS mitigation and avoid dropping legitimate traffic with BGP Flowspec. The feature allows sharing the dynamic signature of the attack with the border routers in fully automatic or semiautomatic mode. Additionally, the solution architecture allows applying different mitigation strategies to each protected segment.

1 face

Mitigation Tiering

Apply different mitigation strategies based on the attack characteristics. Mitigate all attacks up to capacity of your on-prem mitigation appliance and let the rest of the traffic be redirected to a cloud scrubbing service. No manual input needed, everything is fully automated.

1 face

Redirection to Scrubbing

Flowmon allows automatic traffic redirection by using standard mechanisms, such as PBR, BGP and BGP Flowspec, or mitigate the attack using RTBH.

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts