DSI SECURE (PTY) LTD

Delivering Data Security and Testing Solutions

 

 

 
NetFlow Auditor constantly keeps its eyes on your Network and provides total visibility to quickly identify and alert on who is doing what, where, when, with whom and for how long. It learns network behaviors and detects and alerts on anomalies.

NetFlow Auditor is used by organizations of all sizes such as councils, utilities, banking, universities and all tiers of telcos and managed services:

We look forward to you experiencing why we've made many other customers lives very easy with our smart alerting and actionable intelligence and the scalable benefits only NetFlow Auditor can provide.


Scalable & Granular


Superior collection technology for volumes of sustained and burst flows per second. Superior archival technology for depth of collection and hierarchical or clustered views from multiple collectors.

SIEM & IDS


Provides a comprehensive Intrusion Detection (IDS) and security and information event management (SIEM) solution as it gathers, analyzes and presents granular information from multiple network and security devices with comprehensive log auditing, review and incident response.

Real-time & Trending

Supports both Real-time and Trending analysis of Usage, Packets, Conversations and 95th percentiles for network behavior anomaly detection, security forensics, capacity planning and billing purposes. 

Fully supports IPv6 for analytics and billing and includes a comprehensive MAC Address translation for BYOD analytics.

Security orientated with Advanced Network Behavior Anomaly Detection (NBAD), NBAR, DDoS detection, P2P detection, blacklists and advanced Application Mapping.

Flow Collection

Report on Cisco NetFlow, sFlow, jFlow, IPFIX, AppFlow, NetStream. Support for Cisco Routers and Switches, Cisco Adaptive Security Appliance (ASA), Cisco Aggregation Services Router (ASR), Cisco Wide Area Application Service (WAAS), Cisco Nexus, Cisco Medianet, Cisco Wireless LAN Controller (WLC), Checkpoint Firewalls, Routers and Switches such as HP, 3COM, Juniper, Mikrotik, sniffers such as Ixea, Gigamon, nProbe (plus extended DNS, HTTP, SIP, SQL), VMware, Citrix, Fortinet, Barracuda, Alcatel, RAD and more


Total Network Visibility

  • Understand the impact of voice, viruses, hacking, multicast, DNS, peer-to-peer (P2P) and worms on your network.

  • Pro-actively manage and troubleshoot network and application performance issues on even the largest of environments.

  • Identify Bandwidth utilization and abuse and Justify bandwidth upgrades. Accurately plan network changes and new application roll-outs.

  • Validate WAN Optimization schemes with pre-post deployment assessments.

  • Monitor and managing service level agreements

  • Ensure usage policies are enforced.

  • Archive information for regulatory and compliance requirements.

  • Analyze Peering traffic analysis

  • Capacity Plan and forecast capacity requirements

  • Pro-actively manage and troubleshoot network and application performance issues

  • Reduce costs by substantially speeding up Mean Time To Repair (MTTR) and recovery using Automated Diagnostics and Comprehensive Traffic Accounting


Useful Links

 

30 Day Free Trial