Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Progress Kemp Flowmon

Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments. bssgc

Features

  • Flow- based Network performace monitoring and traffic analysis
  • Netflow Collector
  • Netflow Analyzer
  • Unknown threat detection
  • Anomaly Behavior Analysis and Network Behavior Analysis
  • Ransomware Detection
  • AI - Driven Threat Detection
  • Application landscape visibility
  • Latency and response time measurements - User Experience

Benefits

  • Understand, Bandwidth Utiliziation, Capacity, top talkers and traffic structure
  • Receive, process, and Store Netflow data
  • Perform Monitoring, toubleshooting and in depth inspection of Flow Data
  • Spot Zero-day threats
  • Detects cyber-threats
  • Visible impact within minutes
  • Visibility and protection on-premise and in the cloud
  • Encrypted Traffic Analysis
  • Observe, track and report on application landscapes' use

Pricing

£0.01 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 0 0 5 9 0 1 6 6 8 2 0 5 3 9

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
No
System requirements
System requirements can be found here https://docs.progress.com/category/flowmon-documentation

User support

Email or online ticketing support
Email or online ticketing
Support response times
With in 24 hours as a general guideline, not part of SLA commitments. Extended support subscriptions get extra priority.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
"Standard Support is 8x5 in region (12 months is priced at 15% of the license cost)
Enterprise Support is 24x7 phone/ticket based support (12 months is priced at 20% of the license cost)

There is also an option to purchase a 12 month contract to cover an Assigned or Dedicated Support Engineer (POA)"
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We offer customers an initial on-boarding service in order to ensure the successful installation and set-up of Flowmon
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Deletion has a dedicated menu item. Extraction of data, although possible, it's not automated and requires a service
End-of-contract process
Permanent licenses keep working (but will not update), subscriptions will refuse to log new data - history will be observable.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Web based mangement interface; RESTful API interface; PowerShell
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
"Testing was conducted using a variety of operating systems, browsers, automated testing tools, and
screen readers. These included the following: WAVE accessibility Extension for Mozilla Firefox or Chrome browser; NVDA screen reader"
API
Yes
What users can and can't do using the API
Extract data, adjust configuration.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
N/A

Scaling

Independence of resources
Deploy multiple appliances in order to scale and provide resiliance

Analytics

Service usage metrics
Yes
Metrics types
Server Response Times, Round Trip Times (RTT), Delay, Jitter, Retransmissions, Out-Of-Order packets, Use patterns, adaptive trend analysis, Geolocation, AS Numbers
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Kemp

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Deletion has a dedicated menu item. Extraction of data, although possible, it's not automated and requires a service
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
N/A
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Dependent on deployment scenario, and subscription
Approach to resilience
It is possible to configure Flowmon with dual Collectors for resiliancy
Outage reporting
Flowmon can be configured to send logs, emails or SNMP traps for arbitrarily set network events.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication
Local authentication; LDAP
Access restrictions in management interfaces and support channels
LoadMaster bonding/Virtual LAN (VLAN) tagging can be easily set up and configured using the LoadMaster Web User Interface (WUI).
The LoadMaster also supports Virtual Extensible LAN (VXLAN) and VXLAN Tunnel Endpoint (VTEP) capabilities. LoadMasters have the ability to proxy across VXLAN to non-VXLAN networks.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Description of management access authentication
Depending on the service there is combination of ways we authenticate including - VPN, SAML, Public Key

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
A-LIGN
ISO/IEC 27001 accreditation date
17/07/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
N/A
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
N/A
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
N/A

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Undisclosed

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Undisclosed
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Undisclosed
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
N/A
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
https://docs.progress.com/bundle/kemp-product-overview-kemp-terms-of-service-ga/page/Appendix-E-Defect-Work-Around-and-Correction.html

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£0.01 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
N/A
Link to free trial
https://www.flowmon.com/en/download-free-trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.