Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The ARIA Packet Intelligence (PI) application offers OEMs, service providers, and security experts an enhanced method for leveraging SmartNIC technology, focusing on two critical applications: sophisticated packet-level network analytics and the detection, response, and containment of cyber threats. In terms of network analytics, ARIA PI delivers comprehensive visibility across all network traffic, supplying essential analytical data to tools for packet delivery accounting, quality of service management, and service level agreement (SLA) monitoring, ultimately enabling organizations to enhance service delivery and optimize revenue linked to usage-based billing. Regarding cyber-threat management, ARIA PI supplies metadata to threat detection systems, ensuring complete oversight of network traffic, including east-west data flows, which significantly boosts the efficiency of current security measures, such as SIEM and IDS/IPS systems, thereby equipping security teams with improved capabilities to identify, react to, contain, and resolve even the most sophisticated cyber threats. This dual functionality not only strengthens network operations but also fortifies security postures across various sectors.
Description
The Intelligence Hub serves as a comprehensive real-time analytics platform that models and connects client trading activities, plant efficiency, and counterpart execution within venues to facilitate proactive management and operational strategies. Corvil functions as an open data infrastructure that grants API access to a wide array of analytics, trading insights, market data messages, and their foundational packet structures. The Streaming Data API enhances this system by providing an expanding collection of Corvil Connectors, which allow for the seamless integration of streaming data directly from network packets into preferred big data platforms. Additionally, Corvil Center acts as a centralized access point for all analytical and reporting needs, enabling users to visualize vast quantities of granular packet data captured by Corvil with just a few clicks. Furthermore, Corvil Instrumentation delivers exceptional price-to-performance packet analysis and capture appliances, including software-defined packet sniffers known as Corvil Sensors, designed to extend capabilities into virtual and cloud-based environments, as well as the Corvil AppAgent for internal multi-hop software instrumentation, thereby ensuring comprehensive data insights across diverse settings. This integrated approach not only optimizes data accessibility but also enhances decision-making processes for businesses operating in dynamic environments.
API Access
Has API
API Access
Has API
Integrations
Archer
Check Point Harmony Endpoint
Cisco ACI
Cloud Customer Certification Lab
Cortex XSOAR
Fortinet SD-WAN
IBM Cloud
LogRhythm SIEM
Palo Alto Networks VM-Series
Splunk Cloud Platform
Integrations
Archer
Check Point Harmony Endpoint
Cisco ACI
Cloud Customer Certification Lab
Cortex XSOAR
Fortinet SD-WAN
IBM Cloud
LogRhythm SIEM
Palo Alto Networks VM-Series
Splunk Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ARIA Cybersecurity Solutions
Founded
1968
Country
United States
Website
www.ariacybersecurity.com/cybersecurity-products/aria-packet-intelligence/
Vendor Details
Company Name
Pico
Founded
2009
Country
United States
Website
www.pico.net/corvil-analytics/corvil-classic
Product Features
Product Features
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption