Driving Network Visibility
|
|
- Garey Manning
- 5 years ago
- Views:
Transcription
1 Flowmon Price List EUR Driving Network Visibility Flowmon Hardware Appliances... 2 Flowmon Virtual Appliances... 3 Flowmon Cloud... 3 Flowmon ADS Anomaly Detection System... 4 Flowmon DDoS Defender... 4 Flowmon APM Application Performance Monitoring... 5 Flowmon Traffic Recorder... 5 Flowmon Solution Flowmon solution provides flow-based monitoring (NetFlow/IPFIX), Network Behavior Analysis (NBA), Network and Application Performance Monitoring (NPM, APM), on-demand packet capture and DDoS protection. Flowmon solution brings following key benefits: network visibility, reporting and troubleshooting, IP accounting, billing and capacity planning, security monitoring and anomaly detection. Flowmon solution includes following components: Flowmon Probes high performance stand-alone appliance that monitors network traffic in all networks from 10 Mbps to 100 Gbps and generates IP flow statistics. The flow statistics are then exported to storage for further analysis by a Flowmon Collector or other NetFlow/IPFIX compatible application. Flowmon Collectors stand-alone appliances for collection, long-term storage and analysis of flow data (NetFlow, IPFIX, sflow and other) from flow enabled devices (switches, routers), Flowmon Probes or other flow sources. All Flowmon Collector models are equipped with Flowmon Monitoring Center (FMC) tool for flow collection, viewing and analyzing. It provides complete visibility into network traffic, long-term graphs with various perspectives, Top N statistics, user-defined profiles, possibility to drill-down to any communication, reports and more. optional software modules, which extend Flowmon Probes and Flowmon Collectors functionality are descripted below. Flowmon modules are software extensions, which offer additional functionality to Flowmon Probes and Flowmon Collectors. Flowmon modules offers following functionalities: automatic detection of anomalies and undesirable behavior in the network (Flowmon ADS), on-demand full packet capture and traffic recording (Flowmon Traffic Recorder), application performance and end user experience monitoring (Flowmon APM), detection and mitigation of volumetric attacks (Flowmon DDoS Defender). Delivery models The Flowmon solution is available in form of hardware appliance, virtual appliance or as a cloud service. Hardware Appliances Virtual Appliances & Modules Cloud delivery Flowmon Probes and Flowmon Collectors in form of physical rack mount devices/appliances. There is one time price for the appliance and annual fee for maintenance (Gold Support service). Flowmon Probes and Flowmon Collectors Virtual Appliances are designed for deployment into virtual environment (VMware and Hyper-V). Virtual appliances and modules can be delivered in following licensing models: Perpetual licenses one time price for perpetual license per virtual appliance and annual fee for software maintenance (Gold Support service). model annual license fee per virtual appliance. This fee includes software maintenance. Flowmon Collector with or without Flowmon Anomaly Detection System (ADS) delivered from cloud for annual fee. For more information about Flowmon Cloud visit Gold Support (GS) support and maintenance include all updates and upgrades (new functions), support web access, and phone customer support in working hours (8x5), remote SSH support and NBD (Next-Business-Day) on-site hardware support. Gold Support for Flowmon ADS also includes premium service Flowmon Threat Intelligence. For more information about Flowmon solution visit Flowmon Networks web at. All prices in price list are excluding VAT. No rights can be derived from any misprints or typing errors in the price list. 1/5
2 Flowmon Hardware Appliances Flowmon Probe The Flowmon Probe delivers the flow-based monitoring for all networks from 10 Mbps to 100 Gbps. The probe provides the NetFlow/IPFIX data necessary for network monitoring, security, troubleshooting, IP accounting and billing, capacity planning, user and application monitoring or traffic engineering. Flowmon Probe comes in standard or hardware-accelerated version (Pro) with different number and types of monitoring ports. See the product brief and the product specification for detailed information. All Flowmon Probe models (note: valid for physical appliances) offer built-in flow collector and Flowmon Monitoring Center (FMC) tool for flow collection, viewing and analyzing. Built-in collector is restricted to receive flow data only from the probe itself. It is necessary to use stand-alone Flowmon Collector for collecting data from other/multiple sources. List Price Flowmon Probe x 1GbE monitoring port copper Flowmon Probe x 1GbE monitoring ports copper Flowmon Probe x 1GbE monitoring ports copper Flowmon Probe 4000 SFP 4 x 1GbE monitoring ports fiber (SFP) Flowmon Probe 6000 SFP 6 x 1GbE monitoring ports fiber (SFP) Flowmon Probe SFP+ 1 x 10GbE monitoring port fiber (SFP+) Flowmon Probe SFP+ 2 x 10GbE monitoring ports fiber (SFP+) Flowmon Probe SFP+ 4 x 10GbE monitoring ports fiber (SFP+) Flowmon Probe Pro SFP+ 1 x 10GbE monitoring port fiber (SFP+), HW accelerated Flowmon Probe Pro SFP+ 2 x 10GbE monitoring ports fiber (SFP+), HW accelerated Flowmon Probe Pro SFP+ 4 x 10GbE monitoring ports fiber (SFP+), HW accelerated Flowmon Probe Pro QSFP+ 2 x 40GbE or 8 x 10GbE monitoring ports (QSFP+), HW acc Flowmon Probe Pro CFP4 1 x 100GbE monitoring port (CFP4), HW accelerated GS Flowmon Collector The Flowmon Collectors are standalone appliances for collection, long-term storage and analysis of flow data (NetFlow, IPFIX, sflow and other) from flow enabled devices (switches, routers), Flowmon Probes or other flow sources. The Flowmon Collectors come in several models with different storage capacity, type of RAID controller, performance and size (1U/2U). See the product brief and product specification for detailed information. Colored labels express recommendation for which type of organization collector model is suited. Features and differences between individual models are described in specification document. All Flowmon Collector models are equipped with Flowmon Monitoring Center (FMC) tool for flow collection, viewing and analyzing. It provides complete visibility into network traffic, long-term graphs with various perspectives, Top N statistics, user-defined profiles, possibility to drill-down to any communication and more. The function of the collector can be further extended by the Flowmon modules, which bring additional functionality such us Network Behavior Analysis and anomaly detection. List Price Flowmon Collector R Storage capacity 1TB Flowmon Collector R Storage capacity 2TB Flowmon Collector R Pro Storage capacity 3TB Flowmon Collector R Pro Storage capacity 6TB Flowmon Collector R Pro Storage capacity 12TB Flowmon Collector R Pro Storage capacity 24TB Flowmon Collector R Pro Storage capacity 48TB GS Gold Support support and maintenance include all updates and upgrades (new functions), support web access, and phone customer support in working hours (8x5), remote SSH support and NBD (Next-Business-Day) on-site hardware support. Gold Support includes only software maintenance and no hardware support after 5 years since the appliance purchase. Gold Support specification is valid for all newly purchased Flowmon appliances except Office models. Please contact us for specification of Gold Support service for previously purchased appliances. 2/5
3 Flowmon Virtual Appliances Flowmon Probe Virtual Appliances Flowmon Probe Virtual Appliances (VA) are network monitoring appliances designed for deployment into virtual environment (VMware and Hyper-V). Flowmon Probe Virtual Appliances provide similar functionality as Flowmon Probes in form of physical devices. In contrast to Flowmon Probe in form of physical appliances, Flowmon Probe Virtual Appliances don't include built-in collector, so it is necessary to use dedicated collector for NetFlow/IPFIX data storage and analysis. Flowmon Probe 1000 VA 1 x 1Gb Ethernet monitoring port Flowmon Probe 2000 VA 2 x 1Gb Ethernet monitoring ports Flowmon Probe 4000 VA 4 x 1Gb Ethernet monitoring ports Flowmon Probe 6000 VA 6 x 1Gb Ethernet monitoring ports Flowmon Probe VA 1 x 10Gb Ethernet monitoring port Flowmon Probe VA 2 x 10Gb Ethernet monitoring ports Flowmon Collector Virtual Appliance Flowmon Collector Virtual Appliances (VA) are appliances for collection, long-term storage and analysis of flow data (NetFlow, IPFIX, sflow and others) from Flowmon Probes or third party flow sources. Flowmon Collector VA are designed for deployment into virtual environment (VMware and Hyper-V) and provide the same functionality as Flowmon Collector in form of physical devices. Flowmon Collector VA include 2 monitoring ports, which provide network traffic monitoring and flow data (NetFlow/IPFIX) generation. Flowmon Collector VA enable network traffic monitoring in virtual environment without necessity of other appliances for flow data generation. Flowmon Collector 500 VA Storage capacity 500GB Flowmon Collector 1000 VA Storage capacity 1TB Flowmon Collector 2000 VA Storage capacity 2TB Flowmon Collector 3000 VA Storage capacity 3TB Flowmon Collector 6000 VA Storage capacity 6TB Flowmon Collector VA Storage capacity 12TB Flowmon Collector VA Storage capacity 24TB Flowmon Collector VA Storage capacity 48TB Flowmon Collector VA Extension 24TB Storage extension 24TB Flowmon Probe and Flowmon Collector Virtual Appliances are licensed per appliance there is no license restriction in amount of monitored traffic, number of flow data sources or number of users. Gold support Gold support includes all updates and upgrades (new functions), support web access, and phone customer support in working hours (8x5) and remote SSH support. Gold support price is 15% of list price. Flowmon Cloud Cloud delivery offers benefits of Flowmon solution in a form Software-as-a-Service (SaaS). Flow statistics can be generated by your own devices (routers, switches) or Flowmon Probe (HW/VA) can be installed to generate flow statistics. Flowmon Cloud subscriber sends flow statistics to cloud and gets network traffic monitoring and anomaly detection via web user interface. Flowmon enables to create various types of reports and notifications and thus allowing you to be informed about events and incidents which may be compromising your network availability or security. List Price Flowmon Cloud Starter Flowmon Collector 20GB Flowmon Cloud Lite Flowmon Collector 50GB with Flowmon ADS (Lite license) Flowmon Cloud Standard Flowmon Collector 100GB with Flowmon ADS (Standard license) /5
4 Flowmon ADS Anomaly Detection System Flowmon ADS (Anomaly Detection System) is a modern system for automatic detection of anomalies and undesirable behavior in the network. It enhances network security by anomalies detection and also helps with network management by detection of operational issues and events in the network. It is sophisticated system based on Network Behavior Analysis (NBA), which is modern approach for automatic analysis of network traffic. Flowmon ADS is based on permanent evaluation and analysis of network traffic (flow data). The main goal of this system is to reveal operational and security issues and to increase internal and external security of network infrastructure. The basic advantage against IDS systems is orientation to complete behavior of devices in the network, which enables to detect attacks, network traffic anomalies and modern threats (e.g. advanced persistent threats), which are undetectable by traditional signature based systems. Flowmon ADS using premium cloud-based service called Flowmon Threat Intelligence obtains information about recent attackers, infected hosts or botnet command & control centers and using this information detect suspicious network communications. Flowmon Threat Intelligence also updates behavior patterns of detection methods to detect unveiled current threats such as zero day vulnerabilities, etc. Flowmon Threat Intelligence is available for customers with valid Gold Support. Colored labels express recommendation for which type of organization Flowmon ADS model is suited. Features and differences between individual models are described in specification document. Flowmon ADS is available as a software module for Flowmon Probes and Flowmon Collectors. Flowmon ADS Lite Up to 1x 100 fps Flowmon ADS Standard Up to 1x 1000 fps Flowmon ADS Business Up to 2x 2000 fps Flowmon ADS Corporate Up to 3x 3000 fps Flowmon ADS Enterprise Up to 3x 3000 fps Flowmon ADS Ultimate Up to 3x 3000 fps on request on request on request ISP versions of Flowmon ADS are specially designed and optimized for internet service providers, carriers, datacenters to increase network security and identify malicious activities in the backbone networks. These versions support sampling to reach higher performance. Flowmon ADS ISP 1 Monitoring total traffic up to 1Gbps Flowmon ADS ISP 4 Monitoring total traffic up to 4Gbps Flowmon ADS ISP 10 Monitoring total traffic up to 10Gbps Flowmon ADS ISP 40 Monitoring total traffic up to 40Gbps Flowmon ADS ISP 100 Monitoring total traffic up to 100Gbps on request on request on request See the product brief and specification for more information about Flowmon ADS module. Flowmon DDoS Defender Flowmon DDoS Defender is a solution for detection and mitigation of volumetric DDoS (Distributed Denial of Service) attacks. Without any configuration changes, topology changes or any additional investments in the network components, it is possible to detect the volumetric attacks led against the IT infrastructure, servers, critical systems or applications in real time. In collaboration with Scrubbing centers or specialized solutions for DDoS attack elimination deployed out-of-band, Flowmon DDoS Defender mitigates and blocks such attacks automatically. Flowmon DDoS Defender can be deployed in heterogeneous environments collecting common flow statistics from the active network components in various formats and/or processing of highly accurate flow statistics gained through the Flowmon Probes. Flowmon DDoS Defender is available as a software module for Flowmon Collectors and it is licensed according to amount of normal baselined traffic (95 percentile) for all protected profiles. Flowmon DDoS Defender 1 Monitoring total traffic up to 1Gbps Flowmon DDoS Defender 4 Monitoring total traffic up to 4Gbps Flowmon DDoS Defender 10 Monitoring total traffic up to 10Gbps Flowmon DDoS Defender 40 Monitoring total traffic up to 40Gbps Flowmon DDoS Defender 100 Monitoring total traffic up to 100Gbps Flowmon DDoS Defender 400 Monitoring total traffic up to 400Gbps See the product brief and specification for more information about Flowmon DDoS Defender module. 4/5
5 Flowmon APM Application Performance Monitoring Flowmon APM (Application Performance Monitoring) provides real time, detailed performance characteristics and end user experience application monitoring without the need to install server side software agents. Flowmon architecture provides seamless and simple APM installation and integration to deliver transparent monitoring of critical enterprise HTTP/HTTPS applications within minutes. Flowmon APM provides an APM index, which numerically represents application performance in relation to desired SLA levels where 100 represents application performance within SLA limits. Transactions which fall outside the SLA lower the APM index by weighted average, which allows efficient and effective application monitoring, subsequently identifying problems in applications and affected users. Flowmon APM is available as a software module with central console for Flowmon Collector and APM probe licenses which add APM functionality to Flowmon Probes. Flowmon APM Lite 500 tpm*, 1GbE, central console, 1 probe Flowmon APM Standard tpm*, 1GbE, central console, 2 probes Flowmon APM Business tpm*, 1/10GbE, central console, 4 probes Flowmon APM Corporate tpm*, 1/10GbE, central console, 8 probes Flowmon APM Enterprise tpm*, 1/10GbE, central console, 8 probes Flowmon APM - additional probe License for additional probe * tpm transactions per minute See the product brief and specification for more information about Flowmon APM module. Flowmon Traffic Recorder Flowmon Traffic Recorder (TR) extends Flowmon Probe functionality with on-demand full packet capture and recording or a complete packet trace and analysis, to provide an effective network problem resolution and identification. Network capture can be criteria based such as IP addresses, physical (MAC) address, port number etc. Packet capture requests can be entered via a web graphical user interface with the ability to define time, file size or sequence. The PCAP formatted files are then available for download via user interface or API. Flowmon Traffic Recorder module supports distributed architecture that provides recording operations from central collector using multiple probes. Packet capture can be easily started from collector by specification of capture criteria, probe and network interface. The captured traffic is streamed and stored on collector for downloading and further analysis. Flowmon Traffic Recorder (TR) is available as a software module with central console for Flowmon Collector and TR probe licenses which add TR functionality to Flowmon Probes. Flowmon TR Lite 1 probe, 1GbE, central console Flowmon TR Standard 2 probes, 1GbE, central console Flowmon TR Business 4 probes, 1/10GbE, central console Flowmon TR Corporate 8 probes, 1/10GbE, central console Flowmon TR Enterprise 8 probes, 1/10/40/100GbE, central console Flowmon TR - additional probe License for additional probe See the product brief and specification for more information about Flowmon Traffic Recorder module. 5/5
Network Security Monitoring with Flow Data
Network Security Monitoring with Flow Data IT Monitoring in Enterprises NPMD (Network Performance Monitoring & Diagnostics) SNMP basics Flow data for advanced analysis and troubleshooting Packet capture
More informationIt s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security
It s Flow Time! The Role and Importance of Flow Monitoring in Network Operations and Security Pavel Minařík, Chief Technology Officer Neutral Peering Days 2018, The Hague Your customers depend on your
More informationFlow-based Traffic Visibility
Flow-based Traffic Visibility Operations, Performance, Security Pavel Minařík, Chief Technology Officer What is Flow Data? Modern method for network monitoring flow measurement Cisco standard NetFlow v5/v9,
More informationSOLUTION BRIEF: AN END-TO-END DATA CENTER MONITORING SOLUTION VISIT
SOLUTION BRIEF: AN END-TO-END DATA CENTER MONITORING SOLUTION VISIT WWW.PROFITAP.COM Flowmon and Profitap s joint solution offers the most efficient end-toend monitoring platform you can get for a high-speed
More informationNext Generation Network Traffic Monitoring and Anomaly Detection. Petr Springl
Next Generation Network Traffic Monitoring and Anomaly Detection Petr Springl springl@invea-tech.com INVEA-TECH University spin-off company 10 years of development, participation in EU funded projects
More informationDDoS Protection in Backbone Networks
DDoS Protection in Backbone Networks The Czech Way Pavel Minarik, Chief Technology Officer Holland Strikes Back, 3 rd Oct 2017 Backbone DDoS protection Backbone protection is specific High number of up-links,
More informationEFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE
SOLUTION BRIEF EFFECTIVE SERVICE PROVIDER DDOS PROTECTION THAT SAVES DOLLARS AND MAKES SENSE Building effective, affordable and scalable DDoS defense, then monetizing investments with value added scrubbing
More informationAppliance Comparison Chart
Security Gateway Appliances 00 00 500 500 5400 5600 5800 5900 Branch Office Small Enterprise Mid-Size Enterprise Real-World Production Conditions Security 60 50 40 45 600 950 750 400 Firewall (Gbps)..
More informationOSSIR. 8 Novembre 2005
OSSIR 8 Novembre 2005 Arbor Networks: Security Industry Leader Arbor s Peakflow products ensure the security and operational integrity of the world s most critical networks Solid Financial Base Sales have
More informationAppliance Comparison Chart
Security Gateway Appliances 300 300 500 500 5400 5600 5800 5900 Branch Office Small Enterprise Mid-Size Enterprise Real-World Production Conditions Security 60 50 340 45 600 950 750 400 Firewall (Gbps)..
More informationHOW TO ANALYZE AND UNDERSTAND YOUR NETWORK
Handbook HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Part 3: Network Traffic Monitoring or Packet Analysis? by Pavel Minarik, Chief Technology Officer at Flowmon Networks www.flowmon.com In previous two
More informationDDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch)
DDoS Protection in Backbone Networks Deployed at Trenka Informatik AG (www.trenka.ch) Pavel Minarik, Chief Technology Officer SwiNOG meeting, 9 th Nov 2017 Backbone DDoS protection Backbone protection
More informationCisco Stealthwatch Endpoint License
Data Sheet Cisco Stealthwatch Endpoint License With the Cisco Stealthwatch Endpoint License you can conduct in-depth, context-rich investigations into endpoints that exhibit suspicious behavior. In our
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationComprehensive datacenter protection
Comprehensive datacenter protection There are several key drivers that are influencing the DDoS Protection market: DDoS attacks are increasing in frequency DDoS attacks are increasing in size DoS attack
More informationIBM Proventia Network Anomaly Detection System
Providing enterprise network visibility and internal network protection IBM Proventia Network Anomaly Detection System Enhanced network intelligence and security for enterprise networks IBM Proventia Network
More informationFlow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018
Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow
More informationVisual TruView Unified Network and Application Performance Management Focused on the Experience of the End User
Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User BUSINESS CHALLENGE Problems can occur anywhere from the physical layer to wireless, across
More informationDDoS Managed Security Services Playbook
FIRST LINE OF DEFENSE DDoS Managed Security Services Playbook INTRODUCTION Distributed Denial of Service (DDoS) attacks are major threats to your network, your customers and your reputation. They can also
More informationMcAfee Network Security Platform
McAfee Network Security Platform 9.2 (Quick Tour) McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and software that accurately detects and prevents
More informationMonitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks
Monitoring and diagnostics of data infrastructure problems in power engineering Jaroslav Stusak, Sales Director CEE, Flowmon Networks 35,000 kilometers of electric power, which feeds around 740,000 clients...
More informationChapter 2 Reading Organizer
Name Date Chapter 2 Reading Organizer After completion of this chapter, you should be able to: 2.1 Interpret network documentation. Describe the equipment in the enterprise Network Operations Center. Describe
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationRethinking Security: The Need For A Security Delivery Platform
Rethinking Security: The Need For A Security Delivery Platform Cybercrime In Asia: A Changing Environment & Shifting Focus Asia, more vulnerable to cybercrime because of diversity and breadth of countries
More informationMcAfee Network Security Platform 9.1
9.1.7.12-9.1.5.15 NS7x50-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Resolved issues Installation instructions Known issues Product documentation
More informationFlowMon ADS implementation case study
FlowMon ADS implementation case study Kamil Doležel Kamil.dolezel@advaict.com AdvaICT, a.s. Brno, Czech Republic Abstract FlowMon ADS implementation provides completely new insight into networks of all
More informationTALK. agalaxy FOR THUNDER TPS REAL-TIME GLOBAL DDOS DEFENSE MANAGEMENT WITH A10 DATA SHEET DDOS DEFENSE MONITORING AND MANAGEMENT
DATA SHEET agalaxy FOR THUNDER TPS DDOS DEFENSE MONITORING AND MANAGEMENT The A10 agalaxy management system is integrated with PLATFORMS the Thunder TPS (Threat Protection System) for DDoS protection.
More informationSymantec Advanced Threat Protection: Endpoint
Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationRESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises
RESELLER LOGO RADICALLY BETTER DDoS PROTECTION Radically more effective, radically more affordable solutions for small and medium enterprises IT S TIME TO GET SERIOUS ABOUT CYBER CRIME Despite the headline
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationAndrisoft Wanguard. On-premise anti-ddos solution. Carrier-grade DDoS detection and mitigation software. Product Data Sheet Wanguard 6.
Carrier-grade DDoS detection and mitigation software Andrisoft Wanguard On-premise anti-ddos solution Andrisoft Wanguard is enterprise-grade software that delivers to NOC, IT and Security teams the functionality
More informationScrutinizer Flow Analytics
Scrutinizer Flow Analytics TM Scrutinizer Flow Analytics Scrutinizer Flow Analytics is an expert system that highlights characteristics about the network. It uses flow data across dozens or several hundred
More informationNetwork Security Platform Overview
Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and
More informationData Sheet. DPtech Anti-DDoS Series. Overview. Series
Data Sheet DPtech Anti-DDoS Series DPtech Anti-DDoS Series Overview DoS (Denial of Service) leverage various service requests to exhaust victims system resources, causing the victim to deny service to
More informationIntroduction. Learning Network License Introduction
The following provides an introduction to installing the Cisco Stealthwatch Learning Network License (Learning Network License) platform, installing a controller on an ESXi host, and deploying an agent
More informationFloCon Netflow Collection and Analysis at a Tier 1 Internet Peering Point. San Diego, CA. Fred Stringer
10 January 2017 FloCon 2017 San Diego, CA Netflow Collection and Analysis at a Tier 1 Internet Peering Point Fred Stringer AT&T Chief Security Organization Systems Engineer/Network Architect AT&T Intellectual
More informationMcAfee Network Security Platform 8.1
8.1.7.73-8.1.5.163-3.5.82 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.1 Revision B Contents About this release New features Resolved issues Installation instructions Known issues
More informationHow can we gain the insights and control we need to optimize the performance of applications running on our network?
SOLUTION BRIEF CA Network Flow Analysis and Cisco Application Visibility and Control How can we gain the insights and control we need to optimize the performance of applications running on our network?
More informationCyber Security at large scale
Cyber Security & Data Summit June 18 Cyber Security at large scale www.telesoft-technologies.com copyright 2017 by Telesoft Technologies. All rights reserved. Agenda Telesoft Introduction Large scale Challenges
More informationSteelCentral NPM. NetProfiler, NetShark, Flow Gateway & Packet Analyzer. December 2015
SteelCentral NPM NetProfiler, NetShark, Flow Gateway & Packet Analyzer December 2015 IT Ops Network Ops App Ops DevOps LOB Unified Performance Visibility Single Performance Management Interface Real-Time,
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationMcAfee Network Security Platform
Revision B McAfee Network Security Platform (9.2.9.3-9.2.5.34 Manager-NS3500 Release Notes) Contents About this release New Features Resolved issues Installation instructions Known issues Product documentation
More informationAll Events. One Platform.
All Events. One Platform. Industry s first IT ops platform that truly correlates the metric, flow and log events and turns them into actionable insights. Correlate Integrate Analyze www.motadata.com Motadata
More informationNetFlow Optimizer. Overview. Version (Build ) May 2017
NetFlow Optimizer Overview Version 2.4.9 (Build 2.4.9.0.3) May 2017 Copyright 2013-2017 NetFlow Logic Corporation. All rights reserved. Patents both issued and pending. Contents About NetFlow Optimizer...
More informationFlows at Masaryk University Brno
Flows at Masaryk University Brno Jan Vykopal Masaryk University Institute of Computer Science GEANT3/NA3/T4 meeting October 21st, 2009, Belgrade Masaryk University, Brno, Czech Republic The 2nd largest
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationCisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics
Solution Overview Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics BENEFITS Gain visibility across all network conversations, including east-west and north-south
More informationVersion 12 Highlights:
DATA SHEETS Unpublished Datasheet: OptiView XG Network Analysis Tablet - Version 12 Software Release and 10GBASE-T Network Adapter A dedicated tablet for automated network and application analysis, OptiView
More informationDelivers fast, accurate data about security threats:
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationHardware-Accelerated Flexible Flow Measurement
Hardware-Accelerated Flexible Flow Measurement Pavel Čeleda celeda@liberouter.org Martin Žádník zadnik@liberouter.org Lukáš Solanka solanka@liberouter.org Part I Introduction and Related Work Čeleda, Žádník,
More informationCheck Point DDoS Protector Introduction
Check Point DDoS Protector Introduction Petr Kadrmas SE Eastern Europe pkadrmas@checkpoint.com Agenda 1 (D)DoS Trends 2 3 4 DDoS Protector Overview Protections in Details Summary 2 (D)DoS Attack Methods
More informationPulse Secure Application Delivery
DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,
More informationSteelCentral Product Family Specifications
Specification Sheet SteelCentral Product Family Specifications Riverbed SteelCentral NetProfiler Solutions Product Specifications SteelCentral NetProfiler 7, 8, 9 SCNP-04270 Series Model SCNP-02270 Series
More informationSECURITY FOR SMALL BUSINESSES
SECURITY FOR SMALL BUSINESSES 2017 UNCOMPROMISING PERFORMANCE A common problem with firewalls used by small businesses has to do with hardware performance. Most often, vendor-stated bandwidth claims fall
More informationObserver Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
More informationSmartWall Threat Defense System - NTD1100
SmartWall Threat Defense System - NTD1100 Key Benefits Robust, real-time security coverage Real-time Layer 3-7 mitigation against volumetric attacks for both IPv4 and IPv6 traffic. Industry- leading density,
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationMeraki MS Series Switches
Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising
More informationA10 DDOS PROTECTION CLOUD
DATA SHEET A10 DDOS PROTECTION CLOUD A10 Networks provides full spectrum DDoS defenses. This includes multi-vector protection from attacks of any type to ensure the availability of enterprise business
More information2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015
2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks 9 th November 2015 AKAMAI SOLUTIONS WEB PERFORMANCE SOLUTIONS MEDIA DELIVERY SOLUTIONS CLOUD SECURITY SOLUTIONS CLOUD NETWORKING
More informationFlexible and scalable five enterprise-grade Smart-1 dedicated management appliances. Full Threat Visibility
SMART-1 SECURITY MANAGEMENT PLATFORM All-in-one security management solution, with policy management, integrated threat visibility, workflow and orchestration, empowering Check Point Infinity Architecture
More informationAppliance Comparison Chart
Security Gateway Appliances 3200 5200 5400 5600 5800 Branch Office Small Enterprise Mid-Size Enterprise Production Performance (Real-World Traffic Blend) Security 250 425 600 950 750 Firewall (Gbps) 2.
More informationMeraki MS Series Switches
Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising
More informationCisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer
Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability
More informationOpenFlow: What s it Good for?
OpenFlow: What s it Good for? Apricot 2016 Pete Moyer pmoyer@brocade.com Principal Solutions Architect Agenda SDN & OpenFlow Refresher How we got here SDN/OF Deployment Examples Other practical use cases
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationNetwork Visibility or Advanced Security?
Network Visibility or Advanced Security? TechDays 2017 Roman Cupka, Regional Country Manager SEE roman.cupka@flowmon.com Who We Are Founded in 2007 as a University Spinoff International Network & Security
More informationSeceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationWhat s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics
What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market
More informationDDoS MITIGATION BEST PRACTICES
DDoS MITIGATION BEST PRACTICES DDoS ATTACKS ARE INCREASING EXPONENTIALLY Organizations are becoming increasingly aware of the threat that Distributed Denial of Service (DDoS) attacks can pose. According
More informationMcAfee Network Security Platform 8.3
8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationCYBER ANALYTICS. Architecture Overview. Technical Brief. May 2016 novetta.com 2016, Novetta
CYBER ANALYTICS Architecture Overview Technical Brief May 2016 novetta.com 2016, Novetta Novetta Cyber Analytics: Technical Architecture Overview 1 INTRODUCTION 2 CAPTURE AND PROCESS ALL NETWORK TRAFFIC
More informationCisco ASA Software Release 8.2
Cisco ASA Software Release 8.2 Q. When will the Cisco ASA Software Release 8.2 be available? A. Cisco ASA Software Release 8.2 has a targeted release date of April 13, 2009. Q. How do I obtain Cisco ASA
More informationProduct Specifications
Product Specifications ForeScout CounterACT Appliance ForeScout CounterACT is available in a range of physical and virtual appliance options to meet the specific needs of your business. Each CounterACT
More informationInfrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation
Infrastructure Blind Spots Continue to Fuel Personal Data Breaches Sanjay Raja Lumeta Corporation Why Is Real-Time Network & Cloud Situational Awareness Critical? Today s business drivers enable a greater
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks
ddos-guard.net Protecting your business DDoS-GUARD: Distributed protection against distributed attacks 2 WHAT IS A DDOS-ATTACK AND WHY ARE THEY DANGEROUS? Today's global network is a dynamically developing
More informationntop Users Group Meeting
ntop Users Group Meeting ntop Visibility, Security Awareness 1 meeting About ntop Private company devoted to development of Open Source network traffic monitoring applications. ntop (circa 1998) is the
More informationERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016
Abstract The Mirai botnet struck the security industry in three massive attacks that shook traditional DDoS protection paradigms, proving that the Internet of Things (IoT) threat is real and the grounds
More informationMcAfee Network Security Platform 9.2
McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationUX - User Experience: Multi-Cloud Network Visibility
Data Sheet UX - User Experience: Multi-Cloud Network Visibility UX - User Experience monitoring User Experience dashboard summary application performance User Experience is a software module available
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationProtecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
More informationCLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS
CLOUD-BASED DDOS PROTECTION FOR HOSTING PROVIDERS A STRONG PARTNER OUR PORTFOLIO COMPANY Expand your own portfolio with an IT security expert that has redefined DDoS protection from the cloud. Link11 is
More informationSTEELCENTRAL PRODUCT FAMILY SPECIFICATIONS
STEELCENTRAL PRODUCT FAMILY SPECIFICATIONS RIVERBED STEELCENTRAL NETPROFILER SOLUTIONS SteelCentral NetProfiler Model SCNP-02270 Series 7 SCNP-04270 8,9,10 SCNP-04270 8,9,10 Expansion F1 F2 F3 F4 F5 SCNP-04270-UI
More informationIntel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances
Technology Brief Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances The world
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationCisco Security Monitoring, Analysis and Response System 4.2
Q&A Cisco Security Monitoring, Analysis and Response System 4.2 GENERAL Q. What is the Cisco Security Monitoring, Analysis and Response System? A. The Cisco Security Monitoring, Analysis and Response System
More informationMS425 SERIES. 40G fiber aggregation switches designed for large enterprise and campus networks. Datasheet MS425 Series
Datasheet MS425 Series MS425 SERIES 40G fiber aggregation switches designed for large enterprise and campus networks AGGREGATION SWITCHING WITH MERAKI The Cisco Meraki 425 series extends cloud management
More informationTALK THUNDER TPS SURGICAL MULTI-VECTOR DDOS PROTECTION WITH A10 DATASHEET DDOS PROTECTION & MITIGATION
DATASHEET TPS DDOS PROTECTION & MITIGATION The world s highest-performance DDoS protection solution, A10 Thunder TPS TM (Threat Protection System) detects and mitigates terabit-sized DDoS attacks at the
More informationNetwork Service Assurance
Service Assurance Embedded 'Always-On' Ethernet Devices for Circuit 'Turn-Up' Testing & In-Service Assurance for Layer- 2 and Layer-3 infrastructures Ethernet (L-2) - Typical Scenario HQ & Operations Centre
More information:- IDBI /PCELL/ RFP/
Sr. No RFP Page No Section / Clause/Para No Existing clause 1 6 Control Sheet Schedule for receipt of Bids: - 31 st March 2017 at 1600 Hrs. 2 6 Control Sheet Schedule for Opening of Technical Bids: 31
More informationThe Future of Threat Prevention
The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationQTS IS ABOUT CONNECTING YOU
QTS IS ABOUT CONNECTING YOU Where you need it, When you need it, How you need it. MORE THAN DATA SOLUTIONS. DATA SOLVED. QTS recognizes that robust,you need it, carrier-neutral connectivity is a key component
More information