Appliance-based scalable IP packet capturing, reconstruction, indexing, storage and search system
NTSSis a scalable infrastructure element for corporate and business security, capturing all traffic crossing your network perimeter. It performs full traffic recording and reconstruction into meaningful data objects, storing relevant data into instantly searchable database, that you can easily access via web-based interface.
NTSSuses private cloud architecture to flexibly scale out monitoring capacity: data volume captured, stored and indexed, and search response times. System can be scaled out from a single appliance to a large multi-server cluster.
|NTSS can be productively applied across broad spectrum of business areas:|
|•||Corporate Security||•||Information Theft Monitoring|
|•||Communications Risk Management||•||Employee Loyalty Monitoring|
|•||DLP (Data loss prevention)||•||Negative Publicity Tracking|
|•||Long-term Data Retention||•||Post-factum Network Exploit and|
|•||Software Connectivity Problem||Security Incident Analysis|
|Diagnostics||• Internet and Email Use and Abuse|
|•||Software Performance Diagnostics||Monitoring|
Search over 250GB of content in less than 5 seconds on a single NTSS appliance and
maintain the same search time with terabytes of data via clustering. Most ad hoc queries are typically performed under 0.5 second, providing relevant results for pivoting, navigation and exploration of network traffic of particular interest.
and Data Retention
Scales linearly through clustering to support line rates up to 1Gbit/s and data retention policies limited only by disk space for raw IP and reconstructed data.
Simple and Intuitive UI
Browser based NTSS interface allows visual browsing of acquired network data like e-mails, webpages, images and documents. Users can work efficiently and comfortably without knowledge of network protocols or other technical details.
NTSS system users can be alerted in real- time based on user-defined criteria - “content matching”.
Comprehensive traffic filtering rules accommodate Organizational policies for retaining or ignoring certain users, domains or traffic types.
Audited, Role-based NTSS
System User Access
User rights management to enforce roles-based interaction with the system, complete with a full audit trail.
Wide range of reports – user, document type, IP address etc. available to meet every organization needs.
Open Standards Architecture
All traffic META and reference data is retained in open standards XML wrappers, enabling data exchange for 3rd party analysis tools and applications with fully documented API
(Application Programming Interface). Same data is stored in raw network data in pcap (packed capture) format and can be used as evidence in Network Forensic Analysis.
42 Mukusalas St., Riga LV-1004, Latvia Phone: +371-67807099,
fax: +371-67807067, e-mail: email@example.com www.us.lv