The version update 2.0.363 is packed with many requested updates from our users. We migrated from Patricia tree to a new lookup_tree_128bit_t and implemented full support for gobgp_next_hop_host_ipv6 and gobgp_next_hop_subnet_ipv6. ...
Our latest release includes a complete logic to reload per host hostgroups without a FastNetMon restart. We’ve improved IPv6 hostgroup lookup performance and added explicit logic to avoid complex JSON ...
One of the biggest benefits of cloud infrastructure is its (theoretically) infinite scalability. Cloud applications can scale automatically to cope with increased demand, dynamically allocating additional bandwidth and resources as ...
An old IT proverb states, ‘If ain’t broke, don’t fix it’; if a system continues to deliver the results you want, there is no need to replace it. But at ...
The UK’s National Crime Agency has identified two key cyberthreats to business – ransomware and DDoS attacks. But how do we find ourselves in this situation? And what can be ...
Distributed Denial of Service attacks (DDoS) remain one of the most significant cybersecurity threats posed to businesses today. This is particularly true as DDoS attacks are now typically accompanied by ...
It may be tempting to think of DDoS detection and mitigation as being an enterprise-only requirement. But as 40% of all cybersecurity events are now caused by distributed denial of ...
Effective network security can be reduced to two goals; keeping unauthorised users out and keeping sensitive data in. But as IT systems continue to evolve, particularly in the era of ...
Distributed denial of service attacks (DDoS) are a significant risk to businesses of any size. One study found that recovering from a DDoS attack costs between $120,000 and $2m (£93,000 ...
Carpet bombing DDoS attacks are an increasingly common form of cybercrime because they are harder to detect and block than a traditional targeted attack. However, FastNetMon provides powerful configuration options ...