![]() ![]() The ProQueSys solution gives security teams the insight to identify risks before they become viable threats, and effectively investigate an incident if one does occur.Įxplains ProQueSys CEO, Vincent Berk, "We've developed a versatile product that allows IT security teams to proactively protect corporate assets. Risk is simply the opportunity for a problem to develop. At any given moment, a network is either pre-incident or post-incident. Instant access to all relevant data means back to business sooner.ģ) Threat Anticipation. Find out the source and scope of the problem, and fix it. Data leakage, breaches, IP theft, BotNets, and hardware failures all mean one thing – compromised productivity. All Rights Reserved.2) Instant Forensics. Users move easily from views of Top Hosts, Top Talkers, and Top Listeners without leaving their overall view of network activity and device performance.ĭata from the Host Table can be copied and pasted into spreadsheets and reports.Ĭopyright © 2010 Gallop Gazelle IT Ltd. Reporting is fast, extremely granular, and easy to digest. Easily save bandwidth usage and network traffic reports as web pages, or copy and paste selected data into spreadsheets and presentations.ĭata is kept over time – weeks, months, years – to highlight network traffic and usage trends.Īll bandwidth usage and network traffic analysis reports are easily saved as web pages for easy sharing and use in presentations. Intuitive query capabilities and flexible inputs make InterMapper Flows both robust and user-friendly. Tuned for the data-intensive requirements of thorough network traffic analysis, InterMapper data – weeks, months and years-worth- is preserved over time to help managers measure shifts in network traffic and identify usage trends. By collecting data snapshots that are as little as one second apart, accuracy is ensured. ![]() InterMapper Flows conducts full-fidelity NetFlow and sFlow analysis. This precise reporting helps to pinpoint bandwidth hogs and chart their behavior. To measure the exact traffic between two hosts, managers simply create data intervals as short as one second for the two devices. Without leaving the top-level network activity screen view, managers may evaluate data sets such as "Top Talkers", "Top Ports", "Top Sessions", "Top Hosts", and "Top Listeners".īy right-clicking a device, an exporter, an interface, or a subnet, managers can see flow data sorted by application, conversation, domain, endpoint, and protocol further drill down reveals detailed session data and minor network activity. NetFlow and sFlow data summaries transmit vital high level indicators, such as sources and protocols. Powerful tools give managers the ability to observe high level traffic flows in real-time, and, if problems arise, to quickly drill down and explore granular details. InterMapper Flow’s capabilities help network managers successfully monitor complex network environments. ![]() InterMapper Flows - One-Click NetFlow and sFlow Analysis
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |