Remove kentik-detect-alerting-configuring-alert-policies
article thumbnail

Kentik Detect Alerting: Configuring Alert Policies

Kentik

Deep, Powerful Anomaly Detection to Protect Your Network. To stay on top of these changes, you need a comprehensive network visibility solution that includes real-time anomaly detection. To stay on top of these changes, you need a comprehensive network visibility solution that includes real-time anomaly detection.

article thumbnail

Multi-Cloud Made Simple: Announcing Kentik Observability Enhancements for AWS and Google Cloud

Kentik

Today we are thrilled to announce updates to Kentik Cloud that enable network, cloud, and infrastructure teams to rapidly troubleshoot and understand multi-cloud traffic — and futureproof their organizations against the rising network complexity that comes with cloud adoption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

API Monitoring with Kentik

Kentik

Let’s take a look at how to use Kentik as a comprehensive API monitoring solution. We’ll go over how to glean metrics and enable reporting and alerts, as well as what you need to look for in a monitoring tool in general. Monitoring alerts you to performance drops, so you can fix the troublesome service and see what else it’s impacting.

Metrics 52
article thumbnail

Securing Your Network Against Attacks: Prevent, Detect, and Mitigate Cyberthreats

Kentik

Multi- and hybrid cloud infrastructures add further complexity to securing threat surfaces, adding even more variability to permissions, configuration points for human error to enter the scene, and network boundaries to exploit. BGP route leak detection. Detection Try as we might, attacks will still happen. RPKI status checks.

Network 94
article thumbnail

How to Configure Remotely Triggered Black-Hole Routing with Kentik Detect

Kentik

By automating the redirection of undesirable traffic at discrete points in a network, RTBH gives operators the ability to mitigate DDoS and to enforce blacklist/bogon routing policy from a centralized station. An operator would then log into a route server and configure the mitigation, which is a /32 host “black hole” route.

article thumbnail

HBO Attack: Can Alerting Help Protect Data?

Kentik

Setting Kentik Detect to Alert on Unauthorized Data Transfer. Here at Kentik, there’s been a lot of talk around the (virtual) water cooler about how Kentik Detect, specifically our alerting system, might have helped HBO realize that they had a breach. terabytes of private data. Top 25 Interfaces.

Data 40
article thumbnail

Finding Bots with Kentik Detect

Kentik

In our previous post, on CDN Attribution , we mentioned that our development team has been hard at work enabling new ways to visualize and investigate network traffic patterns in Kentik Detect®. in Kentik Detect with IP reputation data from our friends at Spamhaus. Proactive Alerting for Compromised Hosts.

.Net 40