Key visual Product Flow Monitoring

Flow Monitoring: Accurate Traffic Analysis for Resilient Protection


✔   Detect suspicious traffic anomalies automatically and react to them in real time.

✔   Initiate custom configured defensive measures in a matter of seconds.

✔   Define individual threshold values for optimum adaptation of the protection.


Submit a non-binding price request

Myra Flow Monitoring Watches over Your Traffic 24/7

Laptop with statistics on the screen

Reliable DDoS Protection Thanks to Real-Time Monitoring

The Myra Flow Application is operated on a virtual server within your network and constantly receives flow data information from your edge routers. Flow Monitoring evaluates this information to automatically detect malicious traffic in real time. If the defined thresholds are exceeded, mitigation can be started immediately.

  • On-demand operation with fully automatic initiation of mitigation within seconds

  • Designed for network sizes from /24 for IPv4 or /48 for IPv6 (dual stack)

  • Flexible use of real-time monitoring for cloud, on-prem or hybrid operation


Highly Sensitive Attack Detection

The optional Myra Flow Monitoring Advanced allows you to define thresholds even for small networks. This enables strategic protection of your business portfolio if you have divided your network internally into smaller subnets. In the event of an attack, the smallest routable network in which the attacker's target is located can be switched to Myra to be protected.


  • Freely configurable thresholds based onpacket rate (pps) and data rate (Mbps)

  • Support for network sizes from /32 for IPv4 or /128 for IPv6 (dual stack)

  • Automated setup of your networks and individual thresholds

This is why CISOs choose Myra

Our key benefits at a glance

Unlock the Power of Our Comprehensive Certification

Experience peace of mind knowing that our cutting-edge technologies, exceptional services, and streamlined processes are meticulously audited and certified to surpass the highest industry standards.

Embrace Quality with Our "Made in Germany" Assurance

As a company based in Germany, we strictly adhere to the stringent regulations imposed by the GDPR, ensuring that your data privacy is our top priority.

Experience Unmatched Support, Anytime, Anywhere!

Receive unparalleled assistance from a team of security experts, part of our reputable Myra Security Operations Center. We're available 24/7 to address any concerns and provide you with guidance.

Myra Flow Monitoring: Key Features

The most important benefits at a glance


Via API call, Myra Flow Monitoring can automatically initiate mitigation of attacks on demand.

Custom Thresholds

Thresholds for packet and data rate can be set individually for the best possible deployment scenario.

Broad Hardware Support

Myra Flow Monitoring supports routers from Cisco, Juniper, Brocade and other manufacturers.

Variable Mitigation

Myra Flow Monitoring optionally triggers automatic mitigation when the defined thresholds are exceeded – filtering by blackholing or scrubbing.

Myra SOC

Flow Monitoring is managed by our team of IT experts in the Myra Security Operations Center (SOC) at our headquarters in Munich.

Flexibly Configurable

The Myra Flow Appliance offers support for common formats such as Netflow, sFlow, jFlow and Netstream. Freely definable thresholds can be set based on packet rate (pps) and data rate (bps".

Get to Know Our Other Security Solutions for IT Infrastructure

Key visual product Cloud Scrubbing

Cloud Scrubbing

Flexible on demand protection or permanently active always on protection: Secure your data centers and IT infrastructure against volumetric attacks at the network and transport layer. Myra Cloud Scrubbing filters malicious attack traffic fully automatically and delivers only valid clean traffic to your servers.

Learn more
Key visual product On Prem Scrubbing

OnPrem Scrubbing

Secure your customers' networks directly in your own data center, regardless of network size. The Myra OnPrem Scrubbing provides advanced BGP protection against volumetric DDoS attacks even for small networks down to single IPs.

Learn more

Protect your business now: 
Submit a non-binding price request

Discover our customized offering!

  • Our comprehensive security solutions protect your business from the latest threats.

  • Get the solution that is perfectly tailored to your needs.

  • You can expect a response within 24 hours.

  • Our cloud approach means our products can be set up in no time.

All information on data processing can be found in our privacy policy.