Sunday, April 27, 2025
HomeTechELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time...

ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks

Published on

SIEM as a Service

Follow Us on Google News

ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider of open-source and commercial high-speed traffic monitoring applications, have announced a partnership to enhance visibility into malicious traffic originating from opportunistic scans and attacks within the network traffic monitoring tool ntopng.

By integrating a highly accurate and real-time ELLIO: Feed, ntopng’s users gain deeper insights into their network traffic through real-time information on sources of mass exploitation, botnet activity and opportunistic attacks, even before traditional rule-based detections are available.

In modern cybersecurity traffic analysis, the challenge is to anticipate problems before they happen. Blocklists are effective for blocking attackers, but they require high-quality, frequently updated data that is immune to False Positives.

- Advertisement - Google News

“We’ve been using the ELLIO: Feed in live production, and it has proven highly effective at spotting threats. Compared to other security solutions such as IDSs, ELLIO doesn’t require constant supervision and handles zero-day attacks better.

Thus, we’ve partnered with ELLIO to bring their technology to the ntop user community,” said Luca Deri, ntop founder”Obtaining reliable and up-to-date information about mass exploits, botnets, and other widespread attacks is crucial for cybersecurity. These attacks easily disrupt normal network operations, affect service availability and performance, and overwhelm security teams,” said Vlad Iliushin, CEO at ELLIO.

Free trial for all ntopng users

ntopng users with the latest version can enjoy a 30-day free trial of ELLIO: Feed integration by visiting this address: https://ellio.tech/ntop-feed-trial

ELLIO: Feed improves visibility into malicious traffic originating from opportunistic scans and attacks within ntopng traffic monitoring tool

ELLIO: Feed is a threat list that is dynamically updated every minute and contains an average of up to 200,000 IP addresses currently associated with attackers, scans, and other malicious mass exploitation activities on the Internet. This database is constantly regenerated to ensure users have the most up-to-date information on emerging threats. ELLIO’s threat feed is supported by a powerful combination of an extensive internet sensor network operated by ELLIO, advanced ML algorithms, and real-time data processing. This mechanism enables highly reliable and fully automated threat detection delivery.

ntopng is a network traffic monitoring tool that provides a web-based interface for real-time analysis and visualization of network usage. It helps users understand network performance, detect issues, and improve security by offering insights into traffic patterns, protocols, and active hosts.

About ntop

ntop is an engineering-driven company that provides software for network traffic analysis, capture-to-disk and traffic generation applications optimizing the performance of Commercial Off-The-Shelf (COTS) hardware. As a recognized leader in its field, ntop has become an industry-standard application, serving a diverse customer base that spans from individuals to key players in networking. For more information, users can visit https://www.ntop.org/

About ELLIO

ELLIO Technology is a cybersecurity company, streamlining cybersecurity teams’ focus on critical incidents by eliminating alerts from generic attacks and cybernoise distractions. With its extensive network of internet sensors and honeypots, ELLIO collects and analyzes internet traffic, identifies attack data while tagging exploits and vulnerabilities. Through their advanced ML engine, real-time data processing and in-depth research, ELLIO enables organizations to gain a clearer picture of cyber security attacks and incidents. ELLIO provides reliable and fully automated filtering of cyber noise and generic attacks at the network perimeter. It helps reduce “alert fatigue,” the overload caused by too many alerts and events in SIEM and SOAR tools. For more information, users can visit https://ellio.tech/.

Contact

PR Relationships
Jana Tom
ELLIO
pr@ellio.tech

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

When Will Solana Reach $500 and Ethereum $6,000?

While the crypto space prepares for a fresh cycle of innovation and momentum, two...

Emerging Social Media Threats in 2025 and How to Stay Ahead

Social media keeps changing fast. While platforms add new features and ways to connect,...

The Importance of Process Optimization in Achieving Business Goals

In today's fast-paced business environment, organizations are exploring ways to improve process efficiency that...