Infrastructure Management

Explore by sub-topic:

P.com Flowmon Top Image Thumbnail
Threat Detection and Response: How Flowmon Detected an Attack in Real Time
January 27, 2025
This blog highlights how Progress Flowmon was instrumental in detecting a breach experienced by one of our customers.
Read Blog
Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Companies to Comply
The much-anticipated cybersecurity rules by the US Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks. Public companies now face the need to assess their internal disclosure controls, enhance their cybersecurity risk management, and invest effort in drafting their cybersecurity disclosures.
Progress Flowmon Monitoring for Kubernetes Applications
From the perspective of network administrator and operator, the fundamental requirements for network applications are the same regardless of the environment they are running in. They need to have their network communication fast, reliable and secure. To meet these requirements, we need to have relevant data about the application traffic. For this purpose, the flow data from Progress Flowmon Probes fits greatly with a slight difference in comparison to the flows generated in a standard network. It is necessary to correlate the flow data with particular network applications or services running in Kubernetes (k8s). For this purpose, we use k8s metadata rather than relying on IP addresses, as pods are regularly created and destroyed meaning that the traffic for a specific application can be made up of many different IPs in a short period of time. It's also likely that the same IP address will be associated with multiple applications in a limited period of time.
Streamline Incident Analysis in QRadar by Using the Progress Flowmon QRadar Application
Flowmon QRadar integration provides a single pane of glass to detect and respond to Flowmon ADS events directly in IBM QRadar. The integration packages were updated to support the latest version of Flowmon products and the IBM QRadar platform.
The Cybersecurity Threat Landscape in 2024
Over the last few years, the number and severity of cyberattacks against organizations have significantly increased. These attacks come in various forms, including ransomware, distributed denial-of-service (DDoS), data breaches, insider threats and many more. Despite the best efforts of many cybersecurity professionals to minimize these threats, it appears there will be no decrease in the threat level in 2024. As a result, cybersecurity teams are under immense pressure to reduce the risk to their organizations. They need to focus on identifying and mitigating the most significant threats that will likely occur in 2024 and in the future.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation