Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Network Systems Sales LLC
powerful network monitoring & management solution
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Presentation by Priyanka Sawarkar
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
ONE STOP THE TOTAL SERVICE SOLUTION FOR REMOTE DEVICE MANAGMENT.
Introducing Quick Heal Terminator.
Decreasing Incident Response Time ______________________________ Benefits of Packet Capture & Real-time NetFlow Generation Boni Bruno, CISSP, CISM, CGEIT.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
|ESDS SOFTWARE SOLUTION PVT. LTD.| Enterprise Datacenter Management Suite.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
MONITORING TOOLS Open Source Security Tools to monitor your network.
Virtual SharePoint Summit 2010 hosted by Rackspace Overcoming Collaboration Challenges with SharePoint Chris Samson Leslie Sistla Virtual SharePoint Summit.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Department Of Computer Engineering
Security Guidelines and Management
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Avaya Contact Center Control Manager. © 2010 Avaya Inc. All rights reserved. What if you could… 1 Requires purchase of additional connectors  Enable.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
What is FORENSICS? Why do we need Network Forensics?
RiT ’ s Dashboard. An intuitive graphical online management tool with unique personalization capabilities enabling managers to flexibly and proactively.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
May-2010 Indigo Pro Management Platform May 2010.
Vantage Report 3.0 Product Sales Guide
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Network security Product Group 2 McAfee Network Security Platform.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
ECS. Overview Features Architecture Benefits Reports.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
CERN IT Department CH-1211 Genève 23 Switzerland t CERN IT Monitoring and Data Analytics Pedro Andrade (IT-GT) Openlab Workshop on Data Analytics.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Simple, End-to-End Performance Management Application Performance.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Acme Packet Palladion 04/26/12. Palladion Software Suite 5/26/122 Acme Packet confidential.
REMOTE MANAGEMENT OF SYSTEM
Critical Security Controls
Barracuda Web Filtering Service
OptiView™ XG Network Analysis Tablet
2016 Citrix presentation.
Securing the Network Perimeter with ISA 2004
Basic Policy Overview Palo Alto.
Insurance Fraud Analytics in the Cloud with Saama and Microsoft Azure
Getting Started with LANGuardian
GX6116 Product Announcement and High Performance Network Protection Strategy IBM Internet Security Systems Greg Adams.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Features Overview.
AT&T Firewall Battlecard
Comodo Dome Data Protection
IT Management, Simplified
Presentation transcript:

Overview SessionVista™ Enterprise is the first integrated network monitoring and control appliance that combines application layer firewall capabilities with DPI enabled applications and Netflow/IPFIX collection capabilities. SessionVista™ Enterprise is a 1U rack mount server that can be deployed quickly to provide the following functions: application layer firewall, traffic profiling and measurement, network asset inventory, server performance monitoring and network forensics capabilities. SessionVista™ Enterprise can report on up to 400 protocols and 7000 attributes within protocols such as Twitter©, Facebook©, Yahoo!® Mail, Hotmail™, SIP, RTP, BitTorrent™ etc. and logs the information extracted into an onboard database where it is used by numerous applications. SessionVista™ Enterprise is also able to import Netflow v5/v9 and IPFIX feeds from existing probes and routers. SessionVista™ Enterprise can be tailored to an organization’s needs by adding applications. For example, a company needing to investigate corporate espionage would be able to deploy the Investigator™ application to view all s and webmail sent from the network. Similarly, a firm that is concerned about Peer to Peer traffic on their network could use the Application Firewall application to block traffic classified as Peer to Peer. SessionVista™ Enterprise stores protocol metadata on a session basis rather than complete packets like other solutions. This makes searching for the most important information quick even across periods of months and reduces storage costs. This integrated approach increases speed to deployment, reduces operational and training costs and provides a single view across all network data. SessionVista™ Enterprise 1U Server Chassis Dual Quad Core Intel Processor 64 GB RAM 2TB Hard Drive Dual 1Gb Ethernet Interface Mantaro Product Development Services Inc Century Blvd., Germantown MD Applications SessionVista™ Enterprise supports the following applications and use cases in one device: Network Security Application Layer Firewall Insider threat investigation Network forensics Employee activity monitoring investigation Enterprise file tracking and blocking IT Administration Network asset inventory Server performance monitoring Network Monitor Traffic shaping Traffic profiling Netflow/IPFIX collection SessionVista™ Enterprise Datasheet S ESSION V ISTA N ETWORK I NTELLIGENCE S OLUTIONS

Processing Features Widest and deepest range of traffic supported  Over 400 Protocols supported  Over 7000 metadata attributes selectable  Session level reporting for information reduction and flow correlation Targeted content extraction supported  body and attachments  VOIP call content  Social Networking  Instant Messaging Configuration and Operation Intuitive GUI interface Protocols to be extracted are configurable Attributes within protocols are selectable Multiple simultaneous users supported Extraction level filtering Architecture IPFIX based infrastructure Embedded Netflow/IPFIX Collector Writes to a database and/or log file Advanced database schema for metadata Java Enterprise Edition Web Interface for configuration and all applications Performance 1Gb/s classification and metadata extraction Capabilities The SessionVista™ Enterprise system is capable of classifying over 400 protocols which can be used to block specific application traffic when operated in inline mode. SessionVista™ Enterprise can also extract over 7000 attributes from these protocols. It reports on a session basis which reduces the information storage requirement and also makes searching for specific flow metadata very fast. SessionVista™ Enterprise is unique in that it provides numerous benefits for IT administrators that have historically been spread across many probes from multiple vendors. Mantaro Product Development Services Inc Century Blvd., Germantown MD SessionVista™ Enterprise Datasheet S ESSION V ISTA N ETWORK I NTELLIGENCE S OLUTIONS

Traffic Profiler This application provides an IT administrator an enterprise level view of the diverse array of protocols that are present on their network and how they are impacting network performance. This statistical information is stored to a database for trending and analysis. Benefits Include: Superior visibility into 700 protocols Measurement of bandwidth per application Port agnostic applications identification Identify Top Talkers, Power Users, etc… Application Firewall This application provides an IT administrator the capability to enforce application layer security policies on their network. The application allows for flexible policy enforcement based on applications, users, bandwidth, and time of day. Benefits Include: Application Control Increase Security and Compliance Decrease Data Leakage Increase Productivity Eliminate P2P File Sharing Network Asset Inventory This application provides an IT administrator a survey of active hosts and devices on their network and the ability to drill down into what services those hosts are currently running. Benefits Include: Immediate virtual inventory Automated audit process Validate new installs, reconfigurations, etc… Identify changes in network topology After Hours Only Deny File Transfers Allow Based on BW Allow HR Only Deny Based on Type Business Systems Performance This application provides an IT administrator performance monitoring of servers enterprise wide including web, file, printer, VoIP, and database systems. Benefits Include: One dashboard for monitoring critical systems Passive monitoring insures zero interference Configurable threshold alerts ms Mantaro Product Development Services Inc Century Blvd., Germantown MD SessionVista™ Applications – Continuous Monitoring Solutions S ESSION V ISTA N ETWORK I NTELLIGENCE S OLUTIONS

Network Forensics The Network Forensics application allows an IT administrator to visualize the network activities of specific hosts and users over a given time interval. This visualization enables drilling down deeper into suspicious traffic patterns. The rich metadata collected allows visibility to the protocols present in sessions to/from the particular host as well as other layer 1 through 7 metadata. Key Benefits: Geo mapping of IP activities View network usage of 700 different protocols View key protocol metadata for any session over periods of months Individuals of Interest The Individuals of Interest application allows an IT administrator to track the activity of a group of users in near real time. The dashboard shows a particular user’s application usage including web site visits, IM conversations, s, VOIP conversations and more. A historical view is also available to see the user’s past activity. Key Benefits: Near real time updates of a user’s network activities Broad set of application monitoring including VOIP, IM, and Web usage Current and historical views supported Investigator The Investigator allows an IT Administrator to quickly explore connections between senders and recipients. It also allows the capture and inspection of message bodies and attachments. Key Benefits: View message bodies and attachments for mail and webmail protocols Detection of phishing attacks One Platform Multiple Applications Reduce Enterprise IT costs such as network downtime, bandwidth hogs and audit expenses through continuous monitoring Simplify monitoring by using one multi-purpose tool rather than multiple vendor specific solutions Flexibility to add new apps if and when business needs arise Enterprise wide monitoring, reporting and control from one web browser Mantaro Product Development Services Inc Century Blvd., Germantown MD SessionVista™ Applications – Investigation Tools S ESSION V ISTA N ETWORK I NTELLIGENCE S OLUTIONS