Kemp iscombining the network performance monitoring and diagnostic (NPMD) capabilities of its Flowmon product line with the LoadMaster load balancer.
All Kemp load balancers now include native network flow-export capabilities that lend perfect transparency to the status and performance of the network.
With the increased complexity of today’s application infrastructure, shaped by edge computing and cloud, network knowledge is the key enabler for a secure, healthy and well-performing application environment. With the enhanced Network Telemetry statistics and added visualization provided by the Kemp Flowmon Collector, customers can pinpoint the root-cause of emerging issues and easily determine whether they are caused by the application or the network. This includes deep and actionable network insights that detect issues at their early stages before any escalation or outage.
“By combining these two complementary technologies, our customers have the best possible chance of delivering an always-on application experience for their users,” said Jason Dover, VP of Product Strategy for Kemp. “Load balancing serves as a necessary piece of infrastructure to optimize the application experience. Extending its visibility into network traffic empowers IT professionals with deep application performance analysis and proactive bandwidth monitoring across the entire application delivery chain.”
At the heart of our enhanced network telemetry is the integration of the Flowmon Probe to the LoadMaster load balancers as a standard component. This enables Kemp to collect telemetry data about all the network traffic that passes through the LoadMaster and export it to a Kemp Flowmon Collector for analysis and visualization. By leveraging the network and the privileged position of the load balancer, customers get access to one definitive source of truth that helps proactively ensure business-critical applications are being delivered in the most optimized way, whether they reside on premises or in the cloud.
In addition to a full set of NPMD features, the Kemp Flowmon Collector ushers in network detection and response (NDR) tools for zero-day threat hunting, automated packet analysis, and in-depth application performance monitoring.
By leveraging Network Telemetry with the Kemp Flowmon Collector, users can:
- Get visibility into the entire application value delivery chain to identify bottlenecks, misconfigurations, and potential security issues.
- Monitor user experience and network usage round the clock to anticipate and proactively accommodate usage spikes, link saturation, etc.
- Identify the root cause of new application, network, and security issues with a single definitive source of application truth.
- Improve both visibility into network performance and security as well as ability to respond to customer needs and security issues before they become a problem.
The Latest
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...