Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

To effectively identify sophisticated threats, it is essential to conduct thorough inspection, extraction, and real-time analysis of all types of content traversing the network. Fidelis' network detection and response technology systematically scans all ports and protocols in both directions, gathering extensive metadata that serves as the foundation for robust machine-learning analytics. By utilizing sensors for direct, internal, email, web, and cloud communications, you achieve comprehensive network visibility and coverage. The tactics, techniques, and procedures (TTPs) of identified attackers are aligned with the MITRE ATT&CK™ framework, enabling security teams to proactively address potential threats. While threats may attempt to evade detection, they ultimately cannot escape. You can automatically profile and categorize IT assets and services, including enterprise IoT devices, legacy systems, and shadow IT, to create a detailed map of your cyber landscape. Furthermore, when combined with Fidelis' endpoint detection and response offering, you obtain a software asset inventory linked to known vulnerabilities, such as CVE and KB references, along with an assessment of security hygiene concerning patches and the status of endpoints. This comprehensive approach equips organizations with the tools needed to maintain a resilient cybersecurity posture.

Description

Cybercriminals are always on the lookout for innovative methods to circumvent your defenses, and while you create protective measures, they adeptly exploit any vulnerabilities. For this reason, it's imperative to have a robust network security solution that ensures the integrity and accessibility of your network. Riverbed NetProfiler converts network data into actionable security intelligence, offering vital visibility and forensic capabilities for comprehensive threat detection, analysis, and response. By meticulously capturing and archiving all network flow and packet information throughout your organization, it equips you with the essential insights needed to identify and scrutinize advanced persistent threats that may evade standard preventative strategies, as well as those threats that emerge from within the network itself. Distributed Denial of Service (DDoS) attacks are among the most common causes of business interruptions, often targeting vital infrastructures such as power facilities, healthcare systems, educational institutions, and governmental organizations. Protecting against these threats is not just about defense; it's about ensuring the resilience of essential services that our society relies upon.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Azure Marketplace
Check Point IPS
Check Point Infinity
Fidelis Endpoint
Fidelis LRM
Gigamon
Google Digital Risk Protection
Intellicta
Microsoft 365
Microsoft Azure
Network Critical
Oracle Cloud Infrastructure
Pliant
ThreatConnect Risk Quantifier (RQ)
Zscaler

Integrations

Amazon Web Services (AWS)
Azure Marketplace
Check Point IPS
Check Point Infinity
Fidelis Endpoint
Fidelis LRM
Gigamon
Google Digital Risk Protection
Intellicta
Microsoft 365
Microsoft Azure
Network Critical
Oracle Cloud Infrastructure
Pliant
ThreatConnect Risk Quantifier (RQ)
Zscaler

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Fidelis Security

Founded

2002

Country

United States

Website

fidelissecurity.com/products/network/

Vendor Details

Company Name

Riverbed Technology

Founded

2002

Country

United States

Website

www.riverbed.com/products/netprofiler/

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Product Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Alternatives

Fidelis Elevate Reviews

Fidelis Elevate

Fidelis Security
IronDefense Reviews

IronDefense

IronNet Cybersecurity
GigaSECURE Reviews

GigaSECURE

Gigamon
EndaceProbe Reviews

EndaceProbe

Endace