• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2025-2026
  • Cybersecurity Jobs
  • Sponsored Post
    • Make a Contribution
  • Market Reports
  • About
    • GDPR
  • Contact

ELLIO and ntop partnership to boost high-speed network traffic monitoring with real-time data on opportunistic scans, botnets, and mass attacks.

May 29, 2024 By CyberNewswire Leave a Comment

Prague, Czech Republic, May 29th, 2024, CyberNewsWire

ELLIO, a provider of real-time, highly accurate intelligence for filtering of unwanted network traffic and cybernoise, and ntop, a provider of open-source and commercial high-speed traffic monitoring applications, have announced a partnership to enhance visibility into malicious traffic originating from opportunistic scans and attacks within the network traffic monitoring tool ntopng.

By integrating a highly accurate and real-time ELLIO: Feed, ntopng’s users gain deeper insights into their network traffic through real-time information on sources of mass exploitation, botnet activity and opportunistic attacks, even before traditional rule-based detections are available.

In modern cybersecurity traffic analysis, the challenge is to anticipate problems before they happen. Blocklists are effective for blocking attackers, but they require high-quality, frequently updated data that is immune to False Positives.

“We’ve been using the ELLIO: Feed in live production, and it has proven highly effective at spotting threats. Compared to other security solutions such as IDSs, ELLIO doesn’t require constant supervision and handles zero-day attacks better. Thus, we’ve partnered with ELLIO to bring their technology to the ntop user community,” said Luca Deri, ntop founder

“Obtaining reliable and up-to-date information about mass exploits, botnets, and other widespread attacks is crucial for cybersecurity. These attacks easily disrupt normal network operations, affect service availability and performance, and overwhelm security teams,” said Vlad Iliushin, CEO at ELLIO.

Free trial for all ntopng users

ntopng users with the latest version can enjoy a 30-day free trial of ELLIO: Feed integration by visiting this address: https://ellio.tech/ntop-feed-trial

ELLIO: Feed improves visibility into malicious traffic originating from opportunistic scans and attacks within ntopng traffic monitoring tool

ELLIO: Feed is a threat list that is dynamically updated every minute and contains an average of up to 200,000 IP addresses currently associated with attackers, scans, and other malicious mass exploitation activities on the Internet. This database is constantly regenerated to ensure users have the most up-to-date information on emerging threats. ELLIO’s threat feed is supported by a powerful combination of an extensive internet sensor network operated by ELLIO, advanced ML algorithms, and real-time data processing. This mechanism enables highly reliable and fully automated threat detection delivery.

ntopng is a network traffic monitoring tool that provides a web-based interface for real-time analysis and visualization of network usage. It helps users understand network performance, detect issues, and improve security by offering insights into traffic patterns, protocols, and active hosts.

About ntop

ntop is an engineering-driven company that provides software for network traffic analysis, capture-to-disk and traffic generation applications optimizing the performance of Commercial Off-The-Shelf (COTS) hardware. As a recognized leader in its field, ntop has become an industry-standard application, serving a diverse customer base that spans from individuals to key players in networking. For more information, users can visit https://www.ntop.org/

About ELLIO

ELLIO Technology is a cybersecurity company, streamlining cybersecurity teams’ focus on critical incidents by eliminating alerts from generic attacks and cybernoise distractions. With its extensive network of internet sensors and honeypots, ELLIO collects and analyzes internet traffic, identifies attack data while tagging exploits and vulnerabilities. Through their advanced ML engine, real-time data processing and in-depth research, ELLIO enables organizations to gain a clearer picture of cyber security attacks and incidents. ELLIO provides reliable and fully automated filtering of cyber noise and generic attacks at the network perimeter. It helps reduce “alert fatigue,” the overload caused by too many alerts and events in SIEM and SOAR tools. For more information, users can visit https://ellio.tech/

Contact

PR Relationships
Jana Tom
ELLIO
[email protected]

Filed Under: News

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Pathlock Democratizes SAP Cybersecurity with Scalable, Transparent Protection Tiers
  • Aembit Earns Coveted Spot on ‘Rising in Cyber 2025’ List
  • RSA Unveils AI-Driven ISPM and Passwordless Innovations at Infosecurity Europe 2025
  • IonQ Acquires Lightsynq to Push Toward Modular Quantum Networks and the Quantum Internet
  • ThreatBook Selected in the First-ever Gartner® Magic Quadrant™ for Network Detection and Response (NDR)
  • Zero Networks Raises $55M Series C to Simplify Microsegmentation and Empower Cyber Defenders
  • Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities
  • Security Compass Strengthens Secure Software Development Capabilities with Acquisition of Devici
  • Inside the Industrialized Scam Economy: Arkose Labs Unveils How Digital Fraudsters Thrive
  • Cybersecurity Job Market Surges Amid Uncertainty, Fueled by AI Skills and Workforce Development Push

Media Partners

  • Technology Conferences
  • Technologies
  • Event Sharing Network
  • GameTech Market
  • OSINT
  • Event Calendar
  • Calendarial
  • Media Presser
  • 3V

Media Partners

  • App Coding
  • API Coding
  • Blockchaining
  • S3H
  • Press Club
  • VPNW
  • Opinion
  • Media Press Release
  • Defense Market

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research