Every Flow tells a story
Control, Visibility, Analytics & Security
FlowCommand Plus offers the highest level of functionality.
It has added security and control features designed specifically for service providers and for the largest of distributed enterprise customers. Specifically, FlowCommand offers our full set of flow-based security capabilities, including comprehensive data exfiltration controls, real-time DDoS controls, and spotting and throttling Botnet activity in real time as attacks begin. FlowCommand is a Linux software suite that can run on x86 processor cores on bare metal commodity servers,
or as a VM under hypervisor control (VMware or KVM), or both. It can monitor and control data flows between two virtual servers, between two physical networks or between a virtual network and a physical network. These networks can be legacy TCP/IP networks or SDN/NFV-based networks. FlowCommand also includes an intuitive RESTful API plus GUI and CLI interfaces, making it easy to integrate into third-party systems, such as orchestration tools for SDN and NFV.
The world’s first “Net Neutrality” enforcer
Among the service provider features specific to FlowCommand is a unique capability called Net Neutrality. Technically a form of host equalization, Net Neutrality instantly solves the problem of a small group of users attempting to take a disproportionate amount of available bandwidth. When faced with rogue users or peer-to-peer applications, such as BitTorrent and Encrypted BitTorrent, FlowCommand can classify all host flows as a “single” flow and give it exactly the same percentage of available bandwidth that every other flow in the network receives. Or, it can completely block specific traffic if that is the policy.
Net Neutrality can also be applied differently to different classes of applications – what we call ‘Net Neutrality with benefits’. In this case, critical business applications can be grouped together and assigned a high percentage of the available bandwidth with the remaining bandwidth being equally divided among the remaining flows.
There are no Limits
When FlowCommand is in control of mission-critical network links, every single flow is associated in real-time with the:
- Application it is serving (for example, a specific website or business application, or a protocol such as VoIP)
- Geographic location it is serving (generally a country or city)
- Hosts (internal and external) it is connecting
- Users it is serving (via an address-to-user database such as Microsoft Active Directory or OpenLDAP)
- Custom groups — applications, geographic locations, hosts and users can be combined into groups (for example, a group could consist of all countries where a company has business partners, or all applications whose network usage is to be tightly controlled)