No more DIY - ELK stack, Packetbeat and Athena CTI (Cyber Threat Intelligence) combined with just enough operating system (JeOS) to run optimally in a virtual machine.
Real Time, inline enrichment of passive DNS (resolved DNS hostname(s)), IP whois organisation and reputation (known good and/or known bad) for every IP address & DNS hostname, on the fly.
Powerful information source for every network conversation, capturing every network conversation over an extended period of time for unknown devices, unusual traffic patterns, and unexpected behaviours.
Easy to deploy. Get up and running in a few minutes. No change in firewall rules. Invisible to perpetrator(s), inside or outside.
Provide visibility for host network behaviour, monitor which internal devices a host is communicating with, to determine if malware is spreading.
Granular traffic flow visibility can be used to detect persistent network flow-out against customer data, trade secrets, intellectual property, email, or financial data.