Download PDF version Contact company

Flowmon Networks, a vendor of advanced monitoring and security solutions for network infrastructures, announced that it has joined F5 Networks’ Technology Alliance Program (TAP). Together they will bring automated DDoS protection solution to service providers and enterprises.

The latest outbreaks, such as Mirai botnet utilising IoT vulnerabilities, have shown that the DDoS attack landscape is entering a new phase. With IoT, attackers have uncovered a new vector of lucrative denial-of-service extortions with unprecedented magnitude. Simultaneously, organisations must still defend against longstanding attack methods, such as DNS flood.The solution ensures the fastest mean time to resolution while freeing the administrator from manual drudgery

Fast resolution time

Flowmon and F5 Networks have joined together to help service providers to fight multi-vector DDoS attacks and to protect their customers’ businesses. The solution also fits the needs of enterprises which need to ensure availability of their applications. “Our joint solution combines Flowmon’s top notch DDoS detection capabilities with the mitigation excellence of F5’s BIG-IP platform. All of this on a previously unseen level of automation."

"The solution ensures the fastest mean time to resolution while freeing the administrator from manual drudgery,” states Petr Springl, Director of Products & Alliances at Flowmon Networks. “At the same time, the administrator has the entire mitigation process under control.” The joint solution is delivered by Flowmon’s partner Infradata in the United Kingdom.

Attack mitigation

The solution is built upon the integration between Flowmon DDoS Defender and F5 BIG-IP Advanced Firewall Manager (BIG-IP AFM). Flowmon learns and observes network traffic to detect violations and anomalies. When a DDoS attack is detected, Flowmon provides its characteristics, diverts the traffic to BIG-IP AFM, and triggers configuration of BIG-IP AFM.

Thanks to this, F5’s BIG-IP AFM automatically can initiate an appropriate mitigation path. When the attack is over, Flowmon is informed by BIG-IP AFM, changes the routing back to normal, and cleans the configuration of F5 BIG-IP AFM.With deep threat intelligence services, F5 BIG-IP AFM defends against DDoS attacks to all network layers

Deep threat intelligence

With deep threat intelligence services and flexible mitigation options, F5 BIG-IP AFM defends against DDoS attacks to all network layers, stopping them before they cause real damage. Specifically, F5 BIG-IP AFM scales to shut down high-capacity DDoS attacks that can overwhelm applications, intrusion detection and prevention systems, firewalls, and even networks,” says Frank Strobel, Director of Business Development Security Partnerships at F5 Networks.

Flowmon has reached 500% year-to-year revenue growth in UK. To keep the momentum, Flowmon is fortifying its channel and broadening its partner base. Its recently formed business development team, led by Filip Cerny, aims to bring Flowmon's network intelligence especially to internet service providers and the enterprise market.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?