Network Behavioral Analytics

Network Behavioral Analytics With Cytellix


Our solutions incorporate open source and commercial threat intelligence data streams and correlate with enterprise indexed metadata to:

  • Discover newly compromised zombie computers that are operating on your network
  • Discover within minutes whether known command and control (C2) infrastructure on the Internet is accessible from anywhere inside your network edge
  • Discover within minutes whether known Dark Web (TOR) exit nodes are accessible from anywhere inside your network edge
  • Provide real-time identification of nefarious TCP/UDP port usage by known malware exploits
  • Provide real-time identification of changes to TCP/UDP port usage which may be an indicator of compromise – i.e. RDP, FTP usage violations
  • Add the context of NetFlow and other data streams within the embedded Hadoop Distributed File System (HDFS) to provide deeper security intelligence, analysis and insights leading to faster remediation
Image