Flow Monitoring

Accurate traffic analysis for resilient protection:

Automatically detect and respond to suspicious traffic anomalies in real-time. With Myra Flow Monitoring, you initiate custom configured defensive actions in seconds.

This is what Myra Flow Monitoring does for you 


Monitor data traffic in real time

The Myra Flow application is run within the customer's network on a virtual server and constantly receives flow data information from the customer's edge routers. Flow Monitoring evaluates this information and triggers various follow-up processes when defined thresholds are reached.

  • On-demand operation

  • Designed for network sizes from /24 IPv4 or /48 IPv6 (dual stack)

  • BGP FlowSpec support

Fine-grained attack detection (Myra Flow Monitoring Advanced)

Myra Flow Monitoring Advanced allows the definition of thresholds even for small networks. This enables strategic protection of your business portfolio if you have internally divided your network into smaller subnets.

  • Freely definable thresholds based on packet rate (pps) and data rate (bps)

  • Supports network sizes from /32 IPv4 or /128 IPv6 (dual stack)

  • Automated setup of customer network and associated thresholds

Real-time Monitoring


Broad hardware support

Myra Flow Monitoring supports routers from Cisco, Juniper, Brocade and other manufacturers. 

Flexibly configurable

The Myra Flow Appliance offers support for common formats such as Netflow, sFlow, jFlow and Netstream. Freely definable thresholds can be set based on packet rate (pps) and data rate (bps). 

Variable Mitigation

Myra Flow Monitoring optionally triggers automatic mitigation when the defined thresholds are exceeded - filtering by blackholing or scrubbing. 


Myra SOC

Flow Monitoring is managed by our team of IT experts in the Myra Security Operations Center (SOC) at our headquarters in Munich. 

Reporting by mail

Attack mitigations initiated via Myra Flow Monitoring are additionally communicated to the customer via e-mail alert. This includes detailed information on the start and end of mitigation by Myra. 

Key features

of Myra Flow Monitoring


Via API call, Myra Flow Monitoring can automatically initiate mitigation of attacks on demand.

Custom Thresholds

Thresholds for packet and data rate can be set individually for the best possible deployment scenario.

Other products for infrastructure protection  

Cloud Scrubbing

Product in detail

OnPrem Scrubbing

Product in detail

Why Myra Security?  

Our key benefits at a glance

Comprehensive certification 

Our technologies, services and processes are regularly audited and certified to the highest standards. 

Made in Germany

As a company headquartered in Germany, Myra is legally compliant with the GDPR.

Local 24/7 Support 

Get professional help from our IT experts from the Myra SOC (Security Operations Center). 

Protect your business now: 
Request a non-binding offer 


All Myra Services can be implemented at short notice. Contact our 24/7 emergency support so that our team of experts can support you immediately in the event of an attack.

Emergency Form


See for yourself:  
Arrange a free consultation

Our team of experts will be happy to advise you individually and develop a customized solution for your company.

Request consultation now
Price request for the following Myra services


All information on data processing can be found in our privacy policy.