Skip to main content

Kentik Detect Updated

Kentik announced updates to its network analytics platform, Kentik Detect.

The developments – which enable added context and ease of use for fast network insights – are part of Kentik's mission to provide enterprises and service providers with real-time actionable intelligence for both technical and business operations.

"SD-WAN, multi-cloud environments, managed infrastructure, and a dozen other digital transformation trends are making networks continuously more distributed and complex, scaling them beyond what traditional network visibility tools are capable of managing and securing," said Avi Freedman, co-founder and CEO of Kentik. "From the beginning, we built our platform to provide the market with a network traffic intelligence solution that moves beyond data exploration and drives fast, accessible, context-driven insights. These latest product developments are another step forward for proving the truth in network traffic, enabling everyone from network operators, to security teams, to IT managers and executives to easily adopt and extract useful insights from network traffic for better technical and business outcomes."

The following capabilities are now generally available in Kentik Detect:

- Fast Business Intelligence – Kentik's new "Custom Dimensions" makes data more valuable for managers and executives by mapping business data, such as physical locations, onto network data for instant context. It enables a deeper understanding not just of IP addresses, network interfaces, ports, and protocols, but also provides instant context into details such as which customers, categories, and service names could be affected by an incident, informing faster decision-making for response.

- Application and Cloud Performance Insights – Kentik's new software agent, called "kprobe," can collect traffic data directly from hosts, and delivers application context and performance by monitoring incoming and outgoing packets on any network interface. The agent allows scalable collection of network performance (loss / latency) measurements, and layer 7 application decodes from VMs, hypervisors, and machines running tens of gigabits of production traffic, and can also run in public cloud environments where traditional flow data is not available.

- CDN Attribution – This makes it possible for Kentik Detect to tag traffic associated with commercial CDNs, regardless of where the traffic originated – from within the CDN's own network infrastructure, from another network operator's infrastructure, or from caches deployed in their own network. Network operations teams at both service providers and enterprises can now make more informed decisions about where and how to receive these large-volume traffic flows, and better manage their infrastructure, capacity, and costs.

- Threat Feeds – Through a new integration with one of the industry's leading threat intelligence providers, Kentik Detect now uses comprehensive IP reputation data to tag traffic associated with suspected malicious sources or destinations. Hosts that are identified may be infected with malware, participating in botnets, or engaged in other undesirable activity, and can be flagged for customer notification, clean-up, removal from the network, or other security enforcement.

- Capacity Analytics – A dedicated capacity planning workflow inside the Kentik Detect UI eliminates the external spreadsheets, complicated formulas and manual calculations that capacity planners have historically dealt with. Physical and logical objects in the network, such as interfaces, peers, markets, or other dimensions, are organized by percent capacity with projected run-out dates, instantly highlighting and prioritizing items where near-term overutilization threatens network availability.

Kentik also added the following capabilities to its platform for greater accessibility for organization-wide intelligence:

- New User Interface (UI) – Even if you don't operate the network, you can gain intelligence from the data it generates. Kentik's new v3 UI is replatformed to help customers arrive at insights faster. The updates include Guided Mode Dashboards which provide curated, actionable insight for management and non-networking users. New Nested Dashboards group workflows by use case, and reduce time on drilling-down to root cause. Overall, the v3 UI is designed to deliver more out-of-the-box value to Kentik users.

- Single Sign-On (SSO) – To make it more convenient for users across the organization to access Kentik, and to enable centralized authentication, Kentik has rolled out SSO for Kentik Detect. That means Kentik users are now able to access the portal via industry standard SAML2-based authentication services, including Okta, OneLogin, Google, Ping, Duo, and Shibboleth, which are commonly used to access other SaaS-based products.

The Latest

While 87% of manufacturing leaders and technical specialists report that ROI from their AIOps initiatives has met or exceeded expectations, only 37% say they are fully prepared to operationalize AI at scale, according to The Future of IT Operations in the AI Era, a report from Riverbed ...

Many organizations rely on cloud-first architectures to aggregate, analyze, and act on their operational data ... However, not all environments are conducive to cloud-first architectures ... There are limitations to cloud-first architectures that render them ineffective in mission-critical situations where responsiveness, cost control, and data sovereignty are non-negotiable; these limitations include ...

For years, cybersecurity was built around a simple assumption: protect the physical network and trust everything inside it. That model made sense when employees worked in offices, applications lived in data centers, and devices rarely left the building. Today's reality is fluid: people work from everywhere, applications run across multiple clouds, and AI-driven agents are beginning to act on behalf of users. But while the old perimeter dissolved, a new one quietly emerged ...

For years, infrastructure teams have treated compute as a relatively stable input. Capacity was provisioned, costs were forecasted, and performance expectations were set based on the assumption that identical resources behaved identically. That mental model is starting to break down. AI infrastructure is no longer behaving like static cloud capacity. It is increasingly behaving like a market ...

Resilience can no longer be defined by how quickly an organization recovers from an incident or disruption. The effectiveness of any resilience strategy is dependent on its ability to anticipate change, operate under continuous stress, and adapt confidently amid uncertainty ...

Mobile users are less tolerant of app instability than ever before. According to a new report from Luciq, No Margin for Error: What Mobile Users Expect and What Mobile Leaders Must Deliver in 2026, even minor performance issues now result in immediate abandonment, lost purchases, and long-term brand impact ...

Artificial intelligence (AI) has become the dominant force shaping enterprise data strategies. Boards expect progress. Executives expect returns. And data leaders are under pressure to prove that their organizations are "AI-ready" ...

Agentic AI is a major buzzword for 2026. Many tech companies are making bold promises about this technology, but many aren't grounded in reality, at least not yet. This coming year will likely be shaped by reality checks for IT teams, and progress will only come from a focus on strong foundations and disciplined execution ...

AI systems are still prone to hallucinations and misjudgments ... To build the trust needed for adoption, AI must be paired with human-in-the-loop (HITL) oversight, or checkpoints where humans verify, guide, and decide what actions are taken. The balance between autonomy and accountability is what will allow AI to deliver on its promise without sacrificing human trust ...

More data center leaders are reducing their reliance on utility grids by investing in onsite power for rapidly scaling data centers, according to the Data Center Power Report from Bloom Energy ...

Kentik Detect Updated

Kentik announced updates to its network analytics platform, Kentik Detect.

The developments – which enable added context and ease of use for fast network insights – are part of Kentik's mission to provide enterprises and service providers with real-time actionable intelligence for both technical and business operations.

"SD-WAN, multi-cloud environments, managed infrastructure, and a dozen other digital transformation trends are making networks continuously more distributed and complex, scaling them beyond what traditional network visibility tools are capable of managing and securing," said Avi Freedman, co-founder and CEO of Kentik. "From the beginning, we built our platform to provide the market with a network traffic intelligence solution that moves beyond data exploration and drives fast, accessible, context-driven insights. These latest product developments are another step forward for proving the truth in network traffic, enabling everyone from network operators, to security teams, to IT managers and executives to easily adopt and extract useful insights from network traffic for better technical and business outcomes."

The following capabilities are now generally available in Kentik Detect:

- Fast Business Intelligence – Kentik's new "Custom Dimensions" makes data more valuable for managers and executives by mapping business data, such as physical locations, onto network data for instant context. It enables a deeper understanding not just of IP addresses, network interfaces, ports, and protocols, but also provides instant context into details such as which customers, categories, and service names could be affected by an incident, informing faster decision-making for response.

- Application and Cloud Performance Insights – Kentik's new software agent, called "kprobe," can collect traffic data directly from hosts, and delivers application context and performance by monitoring incoming and outgoing packets on any network interface. The agent allows scalable collection of network performance (loss / latency) measurements, and layer 7 application decodes from VMs, hypervisors, and machines running tens of gigabits of production traffic, and can also run in public cloud environments where traditional flow data is not available.

- CDN Attribution – This makes it possible for Kentik Detect to tag traffic associated with commercial CDNs, regardless of where the traffic originated – from within the CDN's own network infrastructure, from another network operator's infrastructure, or from caches deployed in their own network. Network operations teams at both service providers and enterprises can now make more informed decisions about where and how to receive these large-volume traffic flows, and better manage their infrastructure, capacity, and costs.

- Threat Feeds – Through a new integration with one of the industry's leading threat intelligence providers, Kentik Detect now uses comprehensive IP reputation data to tag traffic associated with suspected malicious sources or destinations. Hosts that are identified may be infected with malware, participating in botnets, or engaged in other undesirable activity, and can be flagged for customer notification, clean-up, removal from the network, or other security enforcement.

- Capacity Analytics – A dedicated capacity planning workflow inside the Kentik Detect UI eliminates the external spreadsheets, complicated formulas and manual calculations that capacity planners have historically dealt with. Physical and logical objects in the network, such as interfaces, peers, markets, or other dimensions, are organized by percent capacity with projected run-out dates, instantly highlighting and prioritizing items where near-term overutilization threatens network availability.

Kentik also added the following capabilities to its platform for greater accessibility for organization-wide intelligence:

- New User Interface (UI) – Even if you don't operate the network, you can gain intelligence from the data it generates. Kentik's new v3 UI is replatformed to help customers arrive at insights faster. The updates include Guided Mode Dashboards which provide curated, actionable insight for management and non-networking users. New Nested Dashboards group workflows by use case, and reduce time on drilling-down to root cause. Overall, the v3 UI is designed to deliver more out-of-the-box value to Kentik users.

- Single Sign-On (SSO) – To make it more convenient for users across the organization to access Kentik, and to enable centralized authentication, Kentik has rolled out SSO for Kentik Detect. That means Kentik users are now able to access the portal via industry standard SAML2-based authentication services, including Okta, OneLogin, Google, Ping, Duo, and Shibboleth, which are commonly used to access other SaaS-based products.

The Latest

While 87% of manufacturing leaders and technical specialists report that ROI from their AIOps initiatives has met or exceeded expectations, only 37% say they are fully prepared to operationalize AI at scale, according to The Future of IT Operations in the AI Era, a report from Riverbed ...

Many organizations rely on cloud-first architectures to aggregate, analyze, and act on their operational data ... However, not all environments are conducive to cloud-first architectures ... There are limitations to cloud-first architectures that render them ineffective in mission-critical situations where responsiveness, cost control, and data sovereignty are non-negotiable; these limitations include ...

For years, cybersecurity was built around a simple assumption: protect the physical network and trust everything inside it. That model made sense when employees worked in offices, applications lived in data centers, and devices rarely left the building. Today's reality is fluid: people work from everywhere, applications run across multiple clouds, and AI-driven agents are beginning to act on behalf of users. But while the old perimeter dissolved, a new one quietly emerged ...

For years, infrastructure teams have treated compute as a relatively stable input. Capacity was provisioned, costs were forecasted, and performance expectations were set based on the assumption that identical resources behaved identically. That mental model is starting to break down. AI infrastructure is no longer behaving like static cloud capacity. It is increasingly behaving like a market ...

Resilience can no longer be defined by how quickly an organization recovers from an incident or disruption. The effectiveness of any resilience strategy is dependent on its ability to anticipate change, operate under continuous stress, and adapt confidently amid uncertainty ...

Mobile users are less tolerant of app instability than ever before. According to a new report from Luciq, No Margin for Error: What Mobile Users Expect and What Mobile Leaders Must Deliver in 2026, even minor performance issues now result in immediate abandonment, lost purchases, and long-term brand impact ...

Artificial intelligence (AI) has become the dominant force shaping enterprise data strategies. Boards expect progress. Executives expect returns. And data leaders are under pressure to prove that their organizations are "AI-ready" ...

Agentic AI is a major buzzword for 2026. Many tech companies are making bold promises about this technology, but many aren't grounded in reality, at least not yet. This coming year will likely be shaped by reality checks for IT teams, and progress will only come from a focus on strong foundations and disciplined execution ...

AI systems are still prone to hallucinations and misjudgments ... To build the trust needed for adoption, AI must be paired with human-in-the-loop (HITL) oversight, or checkpoints where humans verify, guide, and decide what actions are taken. The balance between autonomy and accountability is what will allow AI to deliver on its promise without sacrificing human trust ...

More data center leaders are reducing their reliance on utility grids by investing in onsite power for rapidly scaling data centers, according to the Data Center Power Report from Bloom Energy ...