Contact Us

Networking Field Day 14: Wrap-Up & Videos

The 14th Networking Field Day is a wrap and the consensus among in-person delegates, live-streaming viewers, and social media followers is overwhelmingly positive about the Kentik sessions. Kentik CEO and Co-founder, Avi Freedman, and Dan Ellis, Kentik CTO and Co-founder, delivered presentations and discussions on how to turn network data — NetFlow, sFlow, IPFIX, BGP, and performance metrics — into valuable real-time intelligence for digital operations.

NFD 14 Videos

NFD14: Introduction to Kentik

Presenter:  Avi Freedman, CEO and Co-founder

 

NFD14: Kentik Detect Overview

Presenter:  Avi Freedman, CEO and Co-founder

 

NFD14: Kentik Data Engine

Presenter:  Dan Ellis, CTO and Co-Founder

 

NFD14: Kentik DDoS Anomaly Detection

Presenter:  Dan Ellis, CTO and Co-Founder

 

 

Get the white paper!

Learn how much more scalable and detailed NetFlow visibility can be when built on a big data foundation.  Get the the Kentik Detect Overview White Paper now (we’ll email to you).

Expand Icon
Big Data, SaaS NetFlow Visibility

Big Data, SaaS NetFlow Visibility

Kentik Detect runs on a lightning-fast big data platform in the cloud or on-premises. We ingest and store full-resolution network data — NetFlow, sFlow, IPFIX, J-Flow, RFlow, cflowd, GeoIP, BGP, SNMP — and scale seamlessly to any volume of flow. We fuse your data into a unified, time-correlated datastore that’s distributed, multi-tenant, and secure. And we make it available within moments for all of your authorized users to query and view simultaneously.

Expand Icon
DDoS and Anomaly Detection

DDoS and Anomaly Detection

What’s the right mitigation response to a DDoS attack? The answer depends on the nature of the attack and the specifics of your network. So instead of locking you into a monolithic system that limits your options, Kentik Detect let’s you craft an orchestrated, hybrid approach that’s most appropriate to your situation. We offer out-of-the-box integrations with leading DDoS mitigation solution providers and also supply built-in support for Remote Triggered Black Hole (RTBH). You can choose to trigger mitigation automatically when conditions match custom-defined policies, or to receive notifications that request manual approval before mitigation is applied.

Read the PenTeleData case study.

Expand Icon
Intuitive Peering Analytics

Intuitive Peering Analytics

  • Visualize traffic for peering and transit interconnects
  • BGP Path, Neighbor, Next-Hop, Origin and Country views
  • Reduce costs and improve user experience
  • Find downstream business opportunities
Landing Page Quote

Landing Page Quote

“Kentik has given us the insight and visibility that we have not been able to achieve through other network performance monitoring products or open source tools. With over 100 million average monthly unique visitors coming to Yelp, we see traffic reaching many gigabits per second, so it’s critical for us to be able to look deeply into all network traffic in real time and gain real insight. That’s where Kentik has helped. We can see things we simply couldn’t see before.”

— Sam Eaton, Director of Engineering Operations

Start your free trial today.

Free Trial

Request a demo of Kentik services.

Get Demo