Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Junos Traffic Vision is a licensed application designed for traffic sampling on MX Series 3D Universal Edge Routers. It offers comprehensive insights into network traffic flows, which are essential for various operational and planning endeavors. By monitoring the packets processed by the router, it captures critical information such as source and destination addresses, along with packet and byte counts. This data is then aggregated and exported in a standardized format, making it compatible with analysis and presentation tools from both Juniper and third-party vendors that facilitate usage-based accounting, traffic profiling, traffic engineering, and monitoring of attacks and intrusions, as well as service level agreements. Capable of being implemented inline and on service cards that ensure high performance and scalability, Junos Traffic Vision can function in both active and passive modes, seamlessly integrating with lawful intercept filtering and port mirroring without compromising performance. Its versatility and efficiency make it a valuable asset for maintaining robust network management and security.
Description
SentryWire serves as a comprehensive packet capture device and network security monitoring system designed to provide complete visibility into networks across various sectors, including enterprise, federal, and industrial control systems. It is capable of retaining packet capture data for extensive periods—ranging from weeks to years—ensuring that security teams maintain critical insights and can carry out investigations on threats well beyond the lifespan of other monitoring tools. By utilizing commodity hardware, distributed storage solutions, and a modular design, it adeptly captures, indexes, and retains full packet data at scale, accommodating everything from lightweight virtual setups to extensive enterprise clusters. In contrast to traditional packet sniffers that only record headers or metadata, SentryWire archives the entire packet stream, allowing for forensic replays, in-depth packet inspections, and thorough retrospective analyses while offering extended historical investigations. It accommodates capture rates that span from a modest 1 Mbps to an impressive over 1 Tbps, featuring capabilities such as real-time logging, advanced filtering, compression, visualization, and sophisticated BPF-syntax analysis to enhance security operations. This robust platform ultimately empowers organizations to navigate complex network environments with confidence, ensuring they remain vigilant against emerging threats.
API Access
Has API
API Access
Has API
Integrations
Akamai
Armis Centrix
Aruba Cloud
BluVector Advanced Threat Detection
Canonical Juju
Cisco Identity Services Engine (ISE)
Fuze
Ivanti Connect Secure
Ivanti NAC
JumpCloud
Integrations
Akamai
Armis Centrix
Aruba Cloud
BluVector Advanced Threat Detection
Canonical Juju
Cisco Identity Services Engine (ISE)
Fuze
Ivanti Connect Secure
Ivanti NAC
JumpCloud
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Juniper Networks
Founded
1996
Country
United States
Website
www.juniper.net/us/en/products-services/network-edge-services/network-visibility/junos-traffic-vision/
Vendor Details
Company Name
SentryWire
Country
United States
Website
www.sentrywire.com
Product Features
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption