Acceso clientes
Usted está en: ComplexBiz > Productos > AccessData SilentRunner®

AccessData SilentRunner®

Imagen de previsualización de YouTube

SilentRunner® Mobile network forensics software is like having a surveillance camera on your network.

Operating like a network surveillance camera, SilentRunner Mobile allows you to monitor, capture, analyze and graphically visualize network traffic to see exactly what is happening on your network during a proactive audit or cyber investigation. This passive network monitoring solution creates a dynamic picture of communication flows, allowing you to identify and correlate relationships between users, resources, applications and data. In addition, you can play back events from thousands of communications to validate a threat or illegal activity and perform root cause analysis. This dramatically enhances your ability to identify all offenders and exploits, build a case, and locate any stolen information or misused resources.

Detect what Signature-based Tools Can’t See

SilentRunner graphically illustrates communication flows to swiftly expose anomalies, illegal connections, and security and network problems. The time sequencing function allows you to identify network communication “habits”, anomalies and specific events. Being able to see these anomalies is a must have for detecting malware, malicious insiders and advanced persistent threats that have circumvented your perimeter defense and alerting tools.

Catch What DLPs Miss

When anomalies are identified you can drill down into the content to see exactly what is happening — for example credit card numbers being chatted outside the network or somebody visiting unauthorized websites

Root Cause Analysis

Reconstruct events, playing back incidents in real time to determine the origin of a threat, see how it is propagating and quickly identify all compromised assets.

Network Compliance Auditing

Proactively perform network compliance audits to facilitate compliance with regulations such as FISMA, HIPPA, ISO 1779, SOXGLB, and PCI standards.

Monitor Laptops, Even When They Aren’t Logged into Organization’s Network

With typical network forensics tools, once a laptop leaves the organization’s network, you’re blind. But SilentRunner now has a host-based analysis capability that allows you to monitor traveling employees’ internet activity, even if they are using their company laptop on public wifi.

 

Descargar Brochure Informativo Algunos vínculos requieren que el usuario se haya registrado previamente


© 2013 complexbiz. Todos los derechos reservados. la información y gráficas contenidas en este sitio provienen de los fabricantes.