Are you still looking for the network security solutions?

We choose the best one : The Flowwatch

How to install Flowwatch:

There are more and more cyber security threates happened in the world. Flowwatch believes that you should not have to be a security professional to use a security product, so Flowwatch makes it easy to secure and protect your network.

Key Features:

  • Monitor the network traffic in near real-time;
  • Dynamic filtering displaying historical traffic results;
    • The dynamic traffic query feature can be used to trace down the cyber-crime records. This feature can also be used to identify some malicious traffic that the IDP/IPS device cannot detect. The IDP/IPS device cannot detect attacks within encrypted traffic, such as HTTP over SSL(HTTPS), the SSH sessions and the virtual private network(VPN) connections. That means you need another method to detect the network traffic. The following graph shows a malicious active that launch by an infected printer in the real world.


      It generate 43,658,803 packets / 6.13 GB within 5 minutes. The malicious traffic caused the high CPU usage (99%) on the core-switch and caused the internet connection problems. We believe that it is a good idea to choose "the dynamic traffic query" as your network traffic monitoring tool.

  • Provide different kinds of network traffic report;
  • Malicious activity protection:
    • Port scanning detection
    • SSH password-guessing detection
    • UDP flooding attack detection
      • For UDP flooding attack, people always think the attack is launched from outside. That is the most common types of cases. The hackers would prefer to relay hack rather than use their network bandwidth. The relay attack will also consume the victims' bandwidth and may cause the network paralysis. The following graph shows that a UDP flooding attack which was launched from inside.


    • Denial-of-Service(DoS) attack detection
      • It might get a false negative result if you use the threshold to identify the network traffic is a DoS attack or not. The hackers know the threshold value cannot be set too low so they will use this blind-spot to launch the attack. That means the most of IPS which use the threshold methods for DoS will get the false negative result.The following graph shows that a real DoS attack.

        The maximum of flow/second is 213.



    • Worm detection (some ransomware spreading like a worm can be detected)

NSA Discloses Hacking Methods It Says Are Used By Russia: (source)

U.S and British agencies have disclosed hacking methods which are used by Russian intelligence on July 1, 2021. The brute force attack may take long time to complete the task but the hack will eventually crack the password. The activity can be found out by using network traffic analsis.

The Flowwatch can analyze the network data and find out this kind of cyberattack. It is a intelligent software system of collecting and analyzing the network data, such as source IP address, destination IP address, souce port number, destination port number, the protocol, the number of packet and the network traffic. The Flowwatch can accurately capture regularities in the network data so it is extremely effective solution for network security.

Try it for free and see what solution works for you.

30-day Trial Standard Pro
Number of IP addresses you can set Up to 80,000
IP addresses
Up to 200,000
IP addresses
IP addresses
Price Free! Special Offer!

$10000 USD

$3000 USD
Special Offer!

$15000 USD

$10000 USD
Shipping fee - $100 USD
Authentication - Hardware Authenticator
Log in / Register for a new account now
Language English

Log in System Requirements Administrator Guide Return and Exchange Policy
Install Guide Q&A Contact Us