Avatar of mo_patel
mo_patel

asked on 

Network Traffic Monitoring/forensics

Hi All,

wondering what other people use for network traffic monitoring / forensics and their recommendations.  Below are some of my requirements

•      Full visibility of the traffic flow incoming/outgoing

•      Be scalable so if we wanted to have a remote sensor in a different location we wouldn’t have 2 systems, instead have all info from remote location displayed on main GUI

•      It does deep packet inspection/Intrusion detection – which is automatically updated with new signatures

•      Has a DB backend which is used to store the data/ does auto archiving/ able to import archives back in if required for historical investigations

•      Integrated with AD so it can show usernames

•      Create scheduled reports

•      Create custom reports

•      Able to monitor SQL DB – Data Modification/ Schema/ statements

•      See all MS file share traffic i.e. Create/Rename/Delete etc by IP and Username by file name and also be able to seach by filename to investigate last accessed/missing files

•      Set up alerts if something happens i.e. a folder deleted/copied

•      Email Header recording so we can see email subjects/ if we can see content even better
•      Internet Traffic recording

•      Bit-Torrent recording

•      Enables us to create trend graphs so we can see spikes in traffic
SecurityDigital ForensicsNetwork ManagementCyber Security

Avatar of undefined
Last Comment
btan
SOLUTION
Avatar of Confucious2
Confucious2
Flag of South Africa image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
ASKER CERTIFIED SOLUTION
Avatar of btan
btan

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo