• POV: I'm a Senior Director, Global Field & Channel Marketing at Progress

    Aug 20, 2024, 16:17 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Gena Moore, Senior Director, Global Field & Channel Marketing, shares her experience working on and hiring for the Progress field marketing team.
    Full story
  • Secure File Transfer: How to Avoid Risky Inefficiencies

    Aug 20, 2024, 15:27 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    It can be easy to accidentally share sensitive files in an insecure way. Secure file transfer software can help you reduce risk.
    Full story
  • How to Write a Content Management System RFP [CMS RFP Template Included]

    Aug 19, 2024, 15:11 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Let’s look at how a request for proposal can help you find the perfect content management system for your organization. (CMS RFP template included!)
    Full story
  • UX Crash Course: Storyboarding

    Aug 14, 2024, 08:24 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Whether you’re explaining a concept to a stakeholder or client, or to a UI designer, developer or QA tester, everyone benefits from understanding the context in which the feature or product will be applied by the end user. That’s exactly what storyboarding is perfect for!
    Full story
  • Experience Accelerated Search with IP Address Indexing in Flowmon 12.4

    Aug 10, 2024, 08:24 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Progress Flowmon 12.4 addresses the challenges in understanding the need for faster and more efficient data analysis. At Progress, our primary focus is to provide accurate and thorough network data insights to our customers. As our customers' networks grow, the volume of telemetry data expands exponentially. This growth, while beneficial, brings with it the challenge of increasingly longer search times through vast amounts of data. Progress Flowmon 12.4 has implemented IP Indexing, as identifying the activity of an IP address on a network is one of the most common Flowmon use cases for network administrators and cybersecurity teams.  Additional details of what’s new and improved in 12.4 are available on the Flowmon release blog.
    Full story
  • What’s New in Progress Flowmon 12.4?

    Aug 10, 2024, 08:07 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Our development teams continue to improve Progress Flowmon. The latest update takes the core Flowmon product to version 12.4, and our Anomaly Detection System (ADS) becomes release 12.4. For Flowmon 12.4, we want to highlight its newest capability: IP Indexing.
    Full story
  • Catch Cyberattacks Through Reliable Network Detection

    Aug 8, 2024, 21:30 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    In today’s rapidly evolving cyberthreat landscape, organizations require network detection solutions that help identify and mitigate threats before significant damage is done. Among the options available on the Network Detection and Response (NDR) market, Progress Flowmon Anomaly Detection System (ADS) stands out for its unparalleled ability to detect threats throughout every stage of an attack.
    Full story
  • Tech Terms Explained - NDR, MDR, XDR, EDR, SIEM and SOAR

    Aug 8, 2024, 20:09 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    The cybersecurity sector has no shortage of acronyms. The terms Network Detection and Response (NDR), Managed Detection and Response (MDR), Extended Detection and Response (XDR), Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM) and Security Orchestration Automation and Response (SOAR) are used frequently and often without explanation, as it’s assumed everyone knows what they mean.
    Full story
  • The Impact of AI on Cybersecurity

    Aug 8, 2024, 08:13 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Artificial intelligence (AI) is seemingly everywhere in today’s tech landscape. The hype cycle is in full flow, especially regarding the use of large language models (LLM) for generative AI like OpenAI ChatGPT, Google Gemini and Anthropic Claude. Indeed, many tech companies are determined to add LLM into products where it sometimes seems tacked on. One use case where machine learning solutions, including LLMs and other AI techniques, are providing invaluable assistance to humans, is in cybersecurity defense.
    Full story
  • Making Data Storage More Secure with Progress Flowmon and Veeam Backup and Replication

    Aug 7, 2024, 20:18 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    We are happy to announce that Progress has teamed up with Veeam, a leader in data management and protection solutions. The new partnership between Progress and Veeam represents a significant step forward in cybersecurity. It marks a considerable advancement in data protection by merging the Flowmon AI-powered threat detection capabilities with the robust backup solution of Veeam. This empowers organizations to more effectively defend their invaluable digital assets.
    Full story
  • Monitoring the Health Status of Progress Flowmon Appliances with IT Infrastructure Monitoring Tools

    Aug 7, 2024, 09:19 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Progress Flowmon is a core network monitoring and security tool. Confirming if it is up and running can mean the difference between responding to a data breach or overlooking such a critical event. Like any other critical system, it is a good practice to include the monitoring of Flowmon uptime, resource consumption and health in an IT infrastructure monitoring (ITIM) dashboard, such as Progress WhatsUp Gold. Like many other ITIM tools, WhatsUp Gold provides various remote monitoring capabilities, such as SNMP, SSH or REST API-based "active" (WhatsUp Gold initiated) monitors or "passive" (Flowmon-initiated) Syslog monitoring. Depending on your environment size, either the WhatsUp Gold Free edition (for smaller deployments) or a commercially licensed version (for larger environments) would suffice.
    Full story
  • After a Ransomware Infection – Enhancing Security for Your Infrastructure Against Further Intrusion

    Aug 7, 2024, 08:29 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage.
    Full story
  • Application-down Troubleshooting Through the Eyes of a Network Engineer

    Aug 7, 2024, 08:27 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Imagine yourself wearing the hat of a network engineer, where no two days at work are alike. In this dynamic environment, you're often the first point of contact when something remotely IT-related goes wrong, with users frequently pointing fingers at the network. Yet, your expertise lies in knowing the intricacies of network traffic, a vital skill for addressing operational and performance challenges.
    Full story
  • Beyond Traditional Defenses: Integrating IDS and NDR for Improved Detection Capabilities

    Aug 7, 2024, 08:26 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    AI-powered Network Detection and Response (NDR) solutions have become a staple for identifying the subtle indicators of unknown threats, a crucial element in the constant battle against cyberattacks. While NDR excels in unveiling the shadows of the unfamiliar, it is the traditional signature-based Intrusion Detection Systems (IDS) enabling security teams to maximize protection and facilitate targeted responses, particularly when confronting well-known malware. In this article, we delve into the distinct benefits of both AI-driven NDR and conventional approaches. We will also unravel compelling reasons why the integration of these technologies are strategic imperatives in assisting to fortify cybersecurity defenses.
    Full story
  • Detecting Cryptojacking with Progress Flowmon

    Aug 7, 2024, 08:23 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    In the ever-evolving landscape of cybersecurity threats, cryptojacking has emerged as a stealthy and financially motivated attack method. In attacks of this type, cybercriminals hijack servers (or endpoint devices) to use the computing resources to “mine” cryptocurrencies. They get a financial benefit from this activity when they sell the newly minted currencies.
    Full story
  • Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Companies to Comply

    Aug 7, 2024, 08:21 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    The much-anticipated cybersecurity rules by the US Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks. Public companies now face the need to assess their internal disclosure controls, enhance their cybersecurity risk management, and invest effort in drafting their cybersecurity disclosures.
    Full story
  • Progress Flowmon Monitoring for Kubernetes Applications

    Aug 7, 2024, 08:16 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    From the perspective of network administrator and operator, the fundamental requirements for network applications are the same regardless of the environment they are running in. They need to have their network communication fast, reliable and secure. To meet these requirements, we need to have relevant data about the application traffic. For this purpose, the flow data from Progress Flowmon Probes fits greatly with a slight difference in comparison to the flows generated in a standard network. It is necessary to correlate the flow data with particular network applications or services running in Kubernetes (k8s). For this purpose, we use k8s metadata rather than relying on IP addresses, as pods are regularly created and destroyed meaning that the traffic for a specific application can be made up of many different IPs in a short period of time. It's also likely that the same IP address will be associated with multiple applications in a limited period of time.
    Full story
  • Streamline Incident Analysis in QRadar by Using the Progress Flowmon QRadar Application

    Aug 7, 2024, 08:01 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Flowmon QRadar integration provides a single pane of glass to detect and respond to Flowmon ADS events directly in IBM QRadar. The integration packages were updated to support the latest version of Flowmon products and the IBM QRadar platform.
    Full story
  • The Cybersecurity Threat Landscape in 2024

    Aug 7, 2024, 08:00 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    Over the last few years, the number and severity of cyberattacks against organizations have significantly increased. These attacks come in various forms, including ransomware, distributed denial-of-service (DDoS), data breaches, insider threats and many more. Despite the best efforts of many cybersecurity professionals to minimize these threats, it appears there will be no decrease in the threat level in 2024. As a result, cybersecurity teams are under immense pressure to reduce the risk to their organizations. They need to focus on identifying and mitigating the most significant threats that will likely occur in 2024 and in the future.
    Full story
  • The First 48 Hours of Ransomware Incident Response

    Aug 7, 2024, 07:58 by Telerik.Sitefinity.DynamicTypes.Model.Authors.Author
    The initial response to a ransomware attack is crucial for determining the damage in terms of downtime, costs, data loss and company reputation. The sooner you detect the activity associated with ransomware, the sooner you can slow its spread. From there, you can take remedial actions to significantly reduce the effects of the attack. In this blog, we’ll outline key steps organizations should take during the first 48 hours after a ransomware infection is detected. We’ll link to a recent Progress Flowmon webinar on the topic that also discusses how national recommendations and regulatory frameworks, such as NIST and NIS2, provide guidance on cyber responses. The webinar outlines how Flowmon solutions can help with early detection and response to ransomware attacks.
    Full story
Topics

Sitefinity Training and Certification Now Available.

Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.

Learn More
More From Progress
Latest Stories
in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation