skip to Main Content

Team Perspective: Kentik in One Word

Data Explorer in Kentik Portal

The Data Explorer feature of the Kentik portal provides direct views into your network activity and traffic, from a high level down to the deep details on a flow-by-flow basis. Key capabilities include unlimited nested filtering and rapid click-through to get you the answers you need - fast! See just how powerful it is in this screencast video demonstration.
Read more

NFD16: The Kentik Detect SaaS Platform

Jim Meehan, Director of Solutions Engineering at Kentik, reviews the UI and functionality of Kentik Detect, the SaaS-based network traffic intelligence platform. It's designed to keep the full resolution of network flow data, rather than an aggregated ingest. This enables the creation of summary reports, while still allowing for drill down into very narrow pieces of data.
Read more
NFD 16

NFD16: Kentik Data Engine

Kentik Co-founder & CEO Avi Freedman provides a technical overview of the Kentik Data Engine (KDE). It is run in the cloud and designed for the particularly high ingest required to maintain full resolution of all network flow data. KDE allows for real-time stream processing of network traffic for anomaly detection. Avi goes into the details of how the system was designed from the ground up for that specific purpose.
Read more

NFD16: Kentik Detect for Network Peering and Planning

Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, and CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations clear information to prioritize traffic for cost and performance.
Read more

NFD16: Kentik Detect for DDoS and Alerting

Jim Meehan, Director of Solutions Engineering at Kentik, reviews Kentik Detect's alerting capabilities. The solution comes with predefined alert parameters around capacity, general anomalies, and DDoS threats, but these can also be defined per user preference. This can include specific filters and datasets, as well as historical baselines for context.
Read more
Back To Top