This product is registered by Quad Miner Japan Co., Ltd..
About This Product
It is a next-generation SIEM solution that moves beyond simply collecting event logs and analyzes the entirety of all network communications flowing within an enterprise together to detect and respond to all types of cybersecurity threats.
■QUADX Sensor
・Detecting actions performed on the network by rearranging packets up to the application layer (L7)
- Analyze cyber threats from all angles through a highly refined database, and check not just simple logs but even actual packets.
■QUADX Management
・Correlation analysis, critical value-based analysis, and analysis of events collected by multiple devices
・Analyze threats from multiple angles through a supervised learning-based artificial intelligence analysis engine
■QUADX Analyzer
Go beyond simple log collection, analysis, and search to collect network flow and other metadata with higher accuracy and provide comprehensive correlation analysis and compliance management capabilities.
■QUADX Cloud
・Collect logs from various cloud environments and provide network visibility
Easily analyze widely collected data to provide insight into threat analysis
■Deep network traffic analysis
It is possible to analyze cyber threats through the database accumulated from past analyzes and check not just simple logs but also actual packets.
・Correlation analysis under more than 80 conditions
・Event analysis collected from numerous products
・Correlation analysis based on scenarios
■Log data collection
Endpoint security equipment: AV, NAC, DLP, etc.
■Real-time storage and indexing
Network security equipment: FW, IPS, DDoS, etc.
■Relationship analysis
Threat intelligence, latest harmful IP/URLs, and cyber threat trends
■Statistical analysis
Vulnerability, internal asset information, vulnerability information
■Next generation real-time security monitoring and analysis
・Real-time monitoring
・Alarm detailed analysis
・Correlation analysis
・Timeline analysis
・Statistical analysis
・Analysis of intelligence collaboration
■A wealth of logs and full packet linked analysis
・Flow rule information linkage
・Cyber kill chain analysis
・Response to zero-day threats - Rebuild
■Ensuring complete network visibility
・Flow information linkage
・Ensuring network visibility through full packet analysis
・PCAP File transmission
・Expansion of security monitoring area
This is the version of our website addressed to speakers of English in
the United States.
If you are a resident of another country, please select the appropriate version of Metoree for your country in the drop-down menu.