Technology

About the probe

Cryptomage Cyber Eye™ Network Detection and Response class network probe is much more than a traffic flow analytics tool. It provides real-time, network-based anomaly detection and prediction powered by the low-level network protocol, machine learning (ML), and artificial intelligence AI algorithms.

As a result, organizations can identify, monitor and triage traffic flows, connections, and potential malicious events. What provides security teams with increased security and process automation to discover and prevent various threats?

The Cryptomage Cyber Eye™ probe provides security teams with a greater sense of protection, automating processes to detect and prevent threats, allowing them to manage their time and resources efficiently.

Cryptomage Cyber Eye™ NDR probe is custom network equipment based on a proprietary artificial intelligence chip powered by Intel® FPGA technology.

Below is information about the most important modules of the probe.

 

Threat detection

Threat detection provides deep inspection of every single network packet, including transported data, with:

  • Network protocol discovery and validation – easily check unknown and hidden protocols
  • Machine Learning algorithms – proactive traffic risk-scoring

Event management

Event management with full SIEM, SOAR and NGFW integration and export thresholds

  • Risk scoring of each event and host – effective triaging of threats
  • Built-in analytic tools and charts – inform and guide ongoing event management
  • Configurable event triggers – giving you control over certain packets or events when needed

Network monitoring

Network monitoring with proprietary flow metadata formats that go beyond traditional network flow analysis:

  • Protocol behavior and anomaly statistics – wider understanding of traffic flow and behavior
  • Passive mode option – operations don’t interfere directly with network traffic

Forensics

Forensics to better measure the ratio of security events against the source of traffic:

  • Extraction of high-risk network traffic – easy to analyze and focus on specific threat levels
  • Storage of processed traffic metadata in extended format – faster trend analysis

GDPR

Personal data leak detection

  • Inspection of the network packets to detect transmission of personal data such as ID numbers, social security numbers, and bank account numbers
  • Report generation for the Data Protection Officers

If you would like to get new levels of business network security with improved ROI, get in touch with us now (info@cryptomage.com) or (+48 71 757 55 69), and we will respond to your inquiry within 24 hours.

Contact us
X