Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Symantec Network Forensics: Security Analytics, a recognized leader in Network Traffic Analysis and Forensics, has launched a new hardware platform that significantly enhances storage capacity, deployment options, scalability, and overall cost efficiency. This updated model allows for the separation of hardware from software purchases, providing flexibility in enterprise licensing and letting organizations choose their preferred deployment method: on-premises, as a virtual appliance, or in the cloud. With this innovative hardware solution, users can now enjoy the same level of performance while achieving increased storage capabilities in a footprint that occupies up to half the space in a rack. Additionally, this architecture simplifies scalability, enabling security teams to implement solutions throughout their organization and easily adjust their deployments as necessary, without the need to modify their licensing agreements. This advancement ultimately empowers organizations to better manage their security infrastructure and adapt swiftly to evolving demands.
Description
WildFire® employs near real-time analytics to identify novel, targeted malware and advanced persistent threats, ensuring the safety of your organization. It offers sophisticated file analysis features to safeguard applications such as web portals and can seamlessly integrate with SOAR tools among other resources. By utilizing WildFire’s distinct malware analysis capabilities across various threat vectors, your organization can achieve uniform security results through an API. You can select flexible file submission options and adjust query volumes based on your needs, all without the necessity of a next-generation firewall. Take advantage of top-tier advanced analysis and prevention engine capabilities, coupled with regional cloud deployments and a distinctive network effect. Additionally, WildFire merges machine learning, dynamic and static evaluations, alongside a specially designed analysis environment, to uncover even the most intricate threats throughout different stages and attack vectors, thus enhancing your overall security posture. With its comprehensive approach, WildFire ensures that organizations remain resilient against evolving cyber threats.
API Access
Has API
API Access
Has API
Integrations
Chronicle SOAR
Palo Alto Networks Strata
ThreatConnect Risk Quantifier (RQ)
ThreatQ
Integrations
Chronicle SOAR
Palo Alto Networks Strata
ThreatConnect Risk Quantifier (RQ)
ThreatQ
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cyber-security/network/atp/network-forensics-security-analytics
Vendor Details
Company Name
Palo Alto Networks
Country
United States
Website
www.paloaltonetworks.com/products/secure-the-network/wildfire
Product Features
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Network Traffic Analysis (NTA)
Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption