Skip to main content
TrustRadius
Flowmon ADS

Flowmon ADS

Overview

What is Flowmon ADS?

Flowmon Anomaly Detection System (Flowmon ADS) by Kemp is a network security solution that analyzes network traffic from multiple perspectives to counter malicious behaviour and cyberattacks. By using a combination of detection methods, including machine learning, adaptive baselining, heuristics, behaviour patterns, and signatures, context-rich visualization…

Read more
Recent Reviews
Read all reviews
Return to navigation

Product Details

What is Flowmon ADS?

Flowmon Anomaly Detection System (Flowmon ADS) by Kemp is a network security solution that analyzes network traffic from multiple perspectives to counter malicious behaviour and cyberattacks. By using a combination of detection methods, including machine learning, adaptive baselining, heuristics, behaviour patterns, and signatures, context-rich visualization and reporting, ADS provides SecOps teams with capabilities for incident detection, handling, analysis and response.

Flowmon ADS Features

  • Supported: Detection methods (combined machine learning, heuristics, adaptive baselining)
  • Supported: Reputation databases (in-built and custom)
  • Supported: In-built IDS detection
  • Supported: Integration with incident response tools (Cisco, Fortinet, etc.)
  • Supported: Alerting (SIEM/log management, email, API)
  • Supported: Analytical views (drill down) from high level dashboard to forensics with packet data
  • Supported: Configuration wizard for setup
  • Supported: Available as hardware, virtual, cloud appliance
  • Supported: Works with flow data (NetFlow/IPFIX) ensures scalability and encrypted traffic visibility

Flowmon ADS Screenshots

Screenshot of Threats are detected instantly and automatically.Screenshot of Behavior pattern recognition detects threats in their infancy.Screenshot of Machine learning and other algorithms combined to deliver accurate insights.Screenshot of Flowmon ADS is a common grounds for collaboration between NetOps and SecOps on incident resolution.Screenshot of The solution integrates with event logging, ticketing and incident response systems.Screenshot of Incident visualization for instant remediation.

Flowmon ADS Technical Details

Deployment TypesOn-premise
Operating SystemsAppliance
Mobile ApplicationNo
Supported CountriesNorth America, Europe, CIS, APAC
Supported LanguagesEnglish, Spanish, French, German, Japanese, Czech

Flowmon ADS Downloadables

Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(2)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Tomas Plesnik | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Kemp Flowmon ADS is a customizable anomaly detection solution with excellent scalability capabilities and quick integration into the organization environment.
  • Kemp Flowmon ADS provides a large set of essential detections out of the box, which allows us to quickly acquire an awareness of potential problems in the monitored network.
  • Custom configuration, filters, and false-positive flagging make the system highly customizable for diverse environments.
  • Powerful dashboards make summaries and reporting a breeze.
  • Multi-license policy
  • Outdated GUI
  • Limited use of AI methods
Flowmon ADS is a customizable anomaly detection solution with excellent scalability capabilities and quick integration into the organization environment. Flowmon ADS provides a large set of essential detections out of the box, which allows to quickly acquire an awareness of potential problems in the monitored network. Custom configuration, filters, and false-positive flagging make the system highly customizable for diverse environments. Powerful dashboards make summaries and reporting a breeze. We use the Flowmon Anomaly Detection System daily for event detection and incident handling. It provides high-quality detection methods with low false-positive rates.
  • Flowmon ADS provides a large set of essential detections out of the box, which allows to quickly acquire an awareness of potential problems in the monitored network.
  • Custom configuration, filters, and false-positive flagging make the system highly customizable for diverse environments.
  • Powerful dashboards make summaries and reporting a breeze.
  • Early detection of cyber security events and incidents.
  • Processing a large number of network flows on input (which means more than 60K flows per second)
  • Parameterization of detection methods.
  • The possibility to decide on the false-positive rate within the output of each method.
Return to navigation