Network Traffic Monitoring

Industry Solution
Step #1
Perform training with one or more of the following kinds of machine data. Ingest machine data during times of low activity on your endpoint and high activity on your endpoint, so that the full scope of functionality of your software is captured in training.
  • Application specific logs from /var/log
  • Raw dumps from sniffing at Layers 2-3
  • Raw dumps from /proc of kernel data structures
  • Raw dumps of kernel routing tables
  • General system-wide error messages from /var/log/syslog
Step #2
Periodically upload a new source of machine data and get its prediction report. The new source should contain that same kind of machine data with close similarity in structure and formatting to the machine data ingested in training. At a minimum the new source must contain the deltas of that same kind of machine data ingested in training.
Step #3
Parse the predictions report that's in JSON format for threat notifications.
Get Started
Let's develop your plan
Let's talk about your security needs and how we can help you. We can develop the right plan for you that's best for your usage and flexible for your company.
  • Tailored solution for your infrastructure
  • Customized plan that fits your usage
  • Performance-based plans available
  • Deployment in your data center
Name:
Company Name:
Email:
Country: