Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Batfish is an open-source tool designed for network configuration analysis that detects errors and ensures the accuracy of both existing and planned configurations. This tool facilitates the seamless and quick evolution of networks, alleviating concerns over potential outages or security vulnerabilities. Initially created by a collaboration of researchers from Microsoft Research, UCLA, and USC, Batfish has since evolved with contributions from numerous developers. Currently, it is maintained by Intentionet, which also provides Batfish Enterprise, a service that enhances and expands upon the fundamental functionalities of Batfish. Users can utilize Batfish to analyze ACLs and firewall rules, while also examining forwarding paths through traceroute and reachability queries. Additionally, it allows for the assessment of network failure impacts and supports testing methodologies akin to Chaos Monkey. The routing tables generated by Batfish can be closely analyzed, and the tool offers rapid control plane analysis through an abstract representation. Notably, Batfish is capable of performing network analysis in a multivendor environment, accommodating devices from Cisco, Arista, and Cumulus. By leveraging its comprehensive capabilities, network administrators can significantly improve their network reliability and performance.
Description
Deploy the Infection Monkey within your network to rapidly identify vulnerabilities in your security framework. This tool provides a visual representation of your network from an attacker's perspective, highlighting the systems that have been compromised. By infecting a random machine, you can effortlessly uncover potential security weaknesses. It enables you to simulate various scenarios such as credential theft and compromised devices, among other threats. The assessment carried out by the Infection Monkey yields a comprehensive report, offering tailored remediation strategies for each affected machine in your network. Additionally, it presents an overview of immediate security concerns and identifies possible issues, along with a detailed map showcasing the breached systems. The report also includes specific mitigation recommendations, including segmentation and password configurations, ensuring that your network is fortified against future attacks. This proactive approach not only helps in patching current vulnerabilities but also enhances your overall security posture.
API Access
Has API
API Access
Has API
Integrations
Docker
Amazon Web Services (AWS)
Arista EOS
CentOS
Microsoft Azure
Integrations
Docker
Amazon Web Services (AWS)
Arista EOS
CentOS
Microsoft Azure
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Batfish
Founded
2015
Country
United States
Website
www.batfish.org
Vendor Details
Company Name
Akamai
Founded
1998
Country
United States
Website
www.akamai.com/infectionmonkey