Skip to main content

Kemp Acquires Flowmon

Kemp announced the acquisition of Flowmon Networks, a provider of actionable network intelligence solutions for network and security operations (NetSecOps) teams.

The acquisition brings together application delivery and security services with deep network visibility and automated security incident response. Joining these capabilities together arms NetSecOps teams with early detection of advanced threats and network anomalies along with complete active feedback loops for remediation.

The network is essential to application experience, serving as the ultimate source of truth for troubleshooting application disruptions and detecting sophisticated cyber-attacks. Kemp optimizes AX with intelligent traffic steering, authentication and inline web application attack mitigation across more than 100,000 deployments worldwide. The integration with Flowmon’s comprehensive network performance monitoring and diagnostics (NPMD) and NDR solution stack will extend overall application experience control for network and security teams by increasing observability and creating a bridge between applications and the network.

Flowmon’s machine learning (ML)-driven behavior analysis and anomaly detection provides the necessary early detection of the most subtle exploits by malicious actors before they have a negative impact. Integration with front-end proxy, load balancing and application firewalling means that tightly integrated closed feedback and remediation loops can be created that not only provide high-fidelity insights, but also solve the root cause of issues that lead to AX degradation.

Founded in 2007, Flowmon focuses on actionable network intelligence that enables businesses to ensure the performance of networks and the security of the enterprise. Headquartered in Brno, Czech Republic, Flowmon has global channel operations extending to more than 40 countries. The company has more than 1,200 customers worldwide, including AEGON, SEGA, Tieto, Raiffeisen Bank, Kia Motors, KBC, and Orange, and is recognized by Gartner in the NPMD and NDR categories.

Ray Downes, CEO of Kemp Technologies, said: "The expansion of Kemp's portfolio to include Flowmon’s solutions will provide customers the ideal combination of network analysis, preemptive threat detection and workload delivery for optimal, uninterrupted user and application experience."

"We have focused on helping NetSecOps teams protect and better understand their networks, and we are thrilled to be teaming up with Kemp to put our network intelligence capabilities in the hands of more customers globally,” said Jiří Tobola, CEO and co-founder of Flowmon Networks. “With more distributed users and applications, and the increasing use of public and private clouds, we look forward to pairing our solutions to help more customers uncover the unknown threats to their enterprise and ensure the continuous availability of business-critical services."

Flowmon Products and Solutions Incorporated with Kemp

- Flowmon Anomaly Detection System (ADS) - ML-driven detection and mitigation of unknown threats

- Flowmon Packet Investigator – Smart network traffic capture and knowledge-based auditing and automated root-cause analysis of packet data

- Flowmon Application Performance Monitor (APM) – Insights on application and database performance combined with workflow automation for addressing sub-optimal AX

- Flowmon DDoS Defender – Detection and mitigation orchestration of denial-of-service attacks

- Flowmon Collector (Monitoring Center) – Comprehensive analysis and visualization of enriched network telemetry and statistics

- Flowmon Probe – Passive traffic sensor providing NetFlow/IPFIX export, packet capture, network performance monitoring, and intrusion detection (IDS) in hardware, virtual and cloud environments

The Latest

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...

Kemp Acquires Flowmon

Kemp announced the acquisition of Flowmon Networks, a provider of actionable network intelligence solutions for network and security operations (NetSecOps) teams.

The acquisition brings together application delivery and security services with deep network visibility and automated security incident response. Joining these capabilities together arms NetSecOps teams with early detection of advanced threats and network anomalies along with complete active feedback loops for remediation.

The network is essential to application experience, serving as the ultimate source of truth for troubleshooting application disruptions and detecting sophisticated cyber-attacks. Kemp optimizes AX with intelligent traffic steering, authentication and inline web application attack mitigation across more than 100,000 deployments worldwide. The integration with Flowmon’s comprehensive network performance monitoring and diagnostics (NPMD) and NDR solution stack will extend overall application experience control for network and security teams by increasing observability and creating a bridge between applications and the network.

Flowmon’s machine learning (ML)-driven behavior analysis and anomaly detection provides the necessary early detection of the most subtle exploits by malicious actors before they have a negative impact. Integration with front-end proxy, load balancing and application firewalling means that tightly integrated closed feedback and remediation loops can be created that not only provide high-fidelity insights, but also solve the root cause of issues that lead to AX degradation.

Founded in 2007, Flowmon focuses on actionable network intelligence that enables businesses to ensure the performance of networks and the security of the enterprise. Headquartered in Brno, Czech Republic, Flowmon has global channel operations extending to more than 40 countries. The company has more than 1,200 customers worldwide, including AEGON, SEGA, Tieto, Raiffeisen Bank, Kia Motors, KBC, and Orange, and is recognized by Gartner in the NPMD and NDR categories.

Ray Downes, CEO of Kemp Technologies, said: "The expansion of Kemp's portfolio to include Flowmon’s solutions will provide customers the ideal combination of network analysis, preemptive threat detection and workload delivery for optimal, uninterrupted user and application experience."

"We have focused on helping NetSecOps teams protect and better understand their networks, and we are thrilled to be teaming up with Kemp to put our network intelligence capabilities in the hands of more customers globally,” said Jiří Tobola, CEO and co-founder of Flowmon Networks. “With more distributed users and applications, and the increasing use of public and private clouds, we look forward to pairing our solutions to help more customers uncover the unknown threats to their enterprise and ensure the continuous availability of business-critical services."

Flowmon Products and Solutions Incorporated with Kemp

- Flowmon Anomaly Detection System (ADS) - ML-driven detection and mitigation of unknown threats

- Flowmon Packet Investigator – Smart network traffic capture and knowledge-based auditing and automated root-cause analysis of packet data

- Flowmon Application Performance Monitor (APM) – Insights on application and database performance combined with workflow automation for addressing sub-optimal AX

- Flowmon DDoS Defender – Detection and mitigation orchestration of denial-of-service attacks

- Flowmon Collector (Monitoring Center) – Comprehensive analysis and visualization of enriched network telemetry and statistics

- Flowmon Probe – Passive traffic sensor providing NetFlow/IPFIX export, packet capture, network performance monitoring, and intrusion detection (IDS) in hardware, virtual and cloud environments

The Latest

Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...

In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...

Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...

As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

Image
Azul

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...

Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...

IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...

Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

Image
Cloudbrink's Personal SASE services provide last-mile acceleration and reduction in latency

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ... 

In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...