Kentik - Network Observability

Kentik Blog

Most Recent
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Aaron Kagawa, Crystal Li
by Ken Osowski
by Crystal Li, Jim Meehan
by Ken Osowski
by Jim Meehan, Greg Villain
by Crystal Li

Kentik CEO Avi Freedman with PacketPushers on NPM & DDoS

December 19, 2016

Avi Freedman recently spoke with Ethan Banks and Greg Ferro of PacketPushers about Kentik’s latest updates, which focus primarily on features that enhance network performance monitoring and DDoS protection. This post includes excerpts from that conversation as well as a link to the full podcast. Avi discusses his vision of appliance-free network monitoring, explains how host monitoring expands Kentik’s functionality, and gives an overview of how we detect and respond to anomalies and attacks.

Read More

Kentik Cited as IDC Innovator

December 15, 2016

Kentik’s recent recognition as an IDC Innovator for Cloud-Based Network Monitoring was based not only on our orientation as a cloud-based SaaS but also on the deep capabilities of Kentik Detect. In this post we look at how our purpose-built distributed architecture enables us to keep up with raw network traffic data while providing a unified network intelligence solution, including traffic analysis, performance monitoring, Internet peering, and DDoS protection.

Read More

Culture War: Network vs. Cloud

December 12, 2016

Every so often a fundamental shift in technology sets off a culture war in the world of IT. Two decades ago, with the advent of a commercial Internet, it was a struggle between the Bellheads and the Netheads. Today, Netheads have become the establishment and cloud computing advocates are pushing to upend the status quo. In this first post of a 3-part series, analyst Jim Metzler looks at how this dynamic is playing out in IT organizations.

Read More

Big Data DDoS Protection vs the DDoS Marketplaces Threat

November 21, 2016

The source of DDoS attacks is typically depicted as a hoodie-wearing amateur. But the more serious threat is actually a well-developed marketplace for exploits, with vendors whose state-of-the-art technology can easily overwhelm legacy detection systems. In this post we look why you need the firepower of big data to fend off this new breed of commercial attackers.

Read More
We use cookies to deliver our services.
By using our website, you agree to the use of cookies as described in our Privacy Policy.