Network Intelligence in a Box


  • Behavioral Attack Detection
  • Threat Intelligence
  • Network Forensics
  • Traffic Accounting
  • Usage Billing

Behavioral Attack Detection

Network Behavior Anomaly and DDoS Detection
The longer it runs, the smarter it becomes

Threat Intelligence

Threat Intelligence
Global Knowledge - Local Intelligence

Forensics

Enhance Network Security
Analyze every conversation


de facto standard for flow-based
network forensics and visibility

Performance

Real-Time Performance Monitoring
Scalable, Flexible and Granular


Bandwidth Monitoring, QoS, 95th Percentile,
Virtualization Analysis

Flow-Based
Network Intelligence
you can depend on




Security Forensics

World's most scalable and granular netflow product. Address security blind spots highlight P2P, DDoS, Botnet, Long Talkers, Streaming and other hidden anomalies.

Read More

Behavioral Attack Detection

Dynamic Network X-Ray with automated diagnostics enhancing DDoS, security and intrusion detection eliminating network blindspots.

Read More

Performance Monitoring

With just a few clicks, you can have absolute network traffic visibility. See who is doing what, where, when, with whom and for how long.

Read More

About NetFlow Auditor


NetFlow Auditor constantly keeps its eyes on your Network and provides total visibility to quickly identify and alert on who is doing what, where, when, with whom and for how long. It learns network behaviors and detects and alerts on anomalies.

NetFlow Auditor is used by organizations of all sizes such as councils, utilities, banking, universities and all tiers of telcos and managed services:

We look forward to you experiencing why we've made many other customer's lives very easy with our smart alerting and actionable intelligence and the scalable benefits only NetFlow Auditor can provide.

Scalable & Granular

Superior collection technology for volumes of sustained and burst flows per second. Superior archival technology for depth of collection and hierarchical or clustered views from multiple collectors.

SIEM & IDS

Provides a comprehensive Intrusion Detection (IDS) and security and information event management (SIEM) solution as it gathers, analyzes and presents granular information from multiple network and security devices with comprehensive log auditing, review and incident response.

Real-time & Trending
Supports both Real-time and Trending analysis of Usage, Packets, Conversations and 95th percentiles for network behavior anomaly detection, security forensics, capacity planning and billing purposes.

Fully supports IPv6 for analytics and billing and includes a comprehensive MAC Address translation for BYOD analytics.

Security orientated with Advanced Network Behavior Anomaly Detection (NBAD), NBAR, DDoS detection, P2P detection, blacklists and advanced Application Mapping.

Scalable Netflow - 3 key questions to ask
Flow Collection

Report on Cisco NetFlow, sFlow, jFlow, IPFIX, AppFlow, NetStream. Support for Cisco Routers and Switches, Cisco Adaptive Security Appliance (ASA), Cisco Aggregation Services Router (ASR), Cisco Wide Area Application Service (WAAS), Cisco Nexus, Cisco Medianet, Cisco Wireless LAN Controller (WLC), Checkpoint Firewalls, Routers and Switches such as HP, 3COM, Juniper, Mikrotik, sniffers such as Ixea, Gigamon, nProbe (plus extended DNS, HTTP, SIP, SQL), VMware, Citrix, Fortinet, Barracuda, Alcatel, RAD and more

Network Super Vision

Bring your Network into Focus


Total Network Visibility
  • Understand the impact of voice, viruses, hacking, multicast, DNS, peer-to-peer (P2P) and worms on your network.

  • Pro-actively manage and troubleshoot network and application performance issues on even the largest of environments.

  • Identify Bandwidth utilization and abuse and Justify bandwidth upgrades. Accurately plan network changes and new application roll-outs.

  • Validate WAN Optimization schemes with pre-post deployment assessments.

  • Monitor and managing service level agreements

  • Ensure usage policies are enforced.

  • Archive information for regulatory and compliance requirements.

  • Analyze Peering traffic analysis

  • Capacity Plan and forecast capacity requirements

  • Pro-actively manage and troubleshoot network and application performance issues

  • Reduce costs by substantially speeding up Mean Time To Repair (MTTR) and recovery using Automated Diagnostics and Comprehensive Traffic Accounting