Completing the Zero Trust Architecture Network Blackbox-Network Blackbox
Completing the Zero Trust Architecture Network Blackbox-Quad Miner Japan Co., Ltd.

Completing the Zero Trust Architecture Network Blackbox
Quad Miner Japan Co., Ltd.


About This Product

■Collect It records full packets in up to 40G network environments and saves all data without omission. ■Hunting We build a framework for tracking threats from a TTP perspective. ■XSec We accurately analyze the situation and cause from actual packet data based on various correlations tailored to the customer's security policy. ■Response When a potentially dangerous event is detected, it is possible to quickly analyze and respond (initial response, instructions, etc.) based on the related packet file. ■Reproduce network packets in real time It doesn't just save packets, it recombines them up to the application layer (L7) and visualizes what happens on the network. *We also perform various other processes such as virus inspection and abnormal behavior detection. ■Real-time intelligent threat detection Detect abnormalities in real time using the latest threat detection rules. ■Advanced threat response ・Attack detection using signatures ・Attack detection for each event ・C&C, malicious code, worm detection ・Attack detection based on scenario We analyze detected alerts from multiple angles and determine whether or not they are malicious. ■Deep network traffic analysis It is possible to analyze cyber threats through the database accumulated from past analyzes and check not just simple logs but also actual packets. ・Correlation analysis under more than 80 conditions ・Event analysis collected from numerous products ・Correlation analysis based on scenarios ■AI analysis system with supervised learning It learns not only detected events but also various events on the network and accurately detects them. Artificial intelligence with supervised learning can clearly derive cause-and-effect relationships. ■ Obtained GS certification grade 1 Network Blackbox, which can effectively respond to cybersecurity threats, has received the GS Certification Grade 1, a software quality certification, from the Korea Information and Communication Technology Association (TTA). Network Blackbox 3.0 Certification Number 21-0562 ■International patent application (PCT, US, Japan) Network forensics system and network forensics method using the same (PCT-KR2019-008860)

  • Product

    Completing the Zero Trust Architecture Network Blackbox

Share this product


70+ people viewing


Free
Since our quotes are free, feel free to use our service.

No Phone Number Required
You won’t have to worry about receiving unnecessary calls.

1 Models of Completing the Zero Trust Architecture Network Blackbox

Product Image Part Number Price (excluding tax)
Completing the Zero Trust Architecture Network Blackbox-Part Number-Network Blackbox

Network Blackbox

Available upon quote

Customers who viewed this product also viewed

About Company Handling This Product

This is the version of our website addressed to speakers of English in the United States. If you are a resident of another country, please select the appropriate version of Metoree for your country in the drop-down menu.

Copyright © 2024 Metoree