Niksun NetDetector
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers

Values

Enhance Staff Productivity

Reduce Costs

Niksun NetDetector

Comprehensive and Actionable Solution for Securing Networks

Description

NetDetector offers the most advanced forensics, providing the deepest extraction of content from network packets. This enables the deepest and fastest mining and reconstruction of the widest range of content such as voice, video, web, IM, FTP, emails, images, and much more, providing super-fast root cause remediation of security breaches. NetDetector is available in 4 different iterations:
  • NetDetector – a solution for full packet capture, application fingerprinting/reconstruction, IDS and anomaly detection
  •  

  • NetDetectorLive – the full power of NetDetector with real-time reconstruction, indexing and content alarming. Use for proactive cyber-security, data leakage prevention, and real-time surveillance
  •  

  • Virtual NetDetector/NetDetectorLive – lightweight, software deployable versions of NetDetector/NetDetectorLive
  •  

  • IntelliDefend – a lightweight (notebook sized), full packet capture and forensics/analytics device for branch offices.
  •  

Features: Dynamic Application Recognition and Plug-ins NetDetector further improves modularity and scalability by using the Dynamic Application Recognition (DAR) mechanism and plug-in framework for network traffic recognition and processing. Port-based or TCP-based classification methods are insufficient to accurately identify the different types of traffic. The DAR recognition mechanism uniquely recognizes applications using signatures based on the payload as well as header information, providing the ability to identify all rogue applications and malware. Integrated Anomaly and Signature-based IDS NIKSUN NikOS Everest NetDetector offers an integrated anomaly and signature-based IDS solution for fast and accurate detection of intrusions and zero-day attacks. The anomaly-based detection utilizes user-defined and threshold-based anomalies. Apart from guarding proactively against new threats, integrated detection capabilities can be used retroactively on already captured traffic to identify existing victims of cyber attacks. Application and Session Reconstruction The application and session reconstruction feature provides the deepest forensics with hundreds of types of metadata. A network security analyst keen on quickly parsing through terabytes of data can utilize the new GUI in NikOS Everest for both fast reconstruction and in-depth forensics. Full reconstruction of DNS protocol exchanges comes standard with the NetDetector. This enables users to quickly and easily detect interactions with blacklisted DNS servers, which is often a precursor to sophisticated cyber attacks. It also provides faster tracing of occurrences of DNS spoofing or DNS Denial of Service attacks.