Welcome to the NetFlow Auditor Blog

Integrated Cyber Network Intelligence : Why would you need Granular Network Intelligence?

Posted by NetFlow Auditor Team on Apr 4, 2017 7:30:00 AM

“Advanced targeted attacks are set to render prevention-centric security strategies obsolete and that information must become the focal point for our information security strategies.” (Gartner)

In this webinar we take a look at the internal and external threat networks pervasive in todays enterprise and explore why organizations need granular network intelligence.

 

Read More

Topics: Cyber Security

End Point Threat Detection Using NetFlow Analytics

Posted by NetFlow Auditor Team on Feb 21, 2017 8:47:00 AM
Read More

Topics: NetFlow, Cyber Security, Threat Detection

How to Improve Cyber Security with Advanced Netflow Network Forensics

Posted by Rafi Sabel on Jul 7, 2016 7:30:00 AM

Most organizations today deploy network security tools that are built to perform limited prevention - traditionally “blocking and tackling” at the edge of a network using a firewall or by installing security software on every system.

This is only one third of a security solution, and has become the least effective measure.

Read More

Topics: Network Forensics, Cyber Security

NetFlow Auditor @ CyberTech 2016

Posted by Rafi Sabel on Feb 4, 2016 6:40:25 AM
Last week we presented NetFlow Auditor at CyberTech 2016 in Tel Aviv, Israel. Cybertech is the most significant conference and exhibition of cyber technologies outside of the United States.
 
Israel is building a name for itself as the global center of cybersecurity and we have a unique network intelligence solution that fits the Israeli cybersecurity vision. NetFlow Auditor’s unique approach to delivering granular Network Security Forensics, Intelligent Behavior Anomaly Detection and Diagnostics and End-Point Threat Detection was appreciated by the "who’s who" of the Israeli Cyber community that intimately understand the need for granular network intelligence and threat mitigation.
Read More

Topics: Cyber Security