SilentRunner® Sentinel network forensics software is like having a surveillance camera on your network.
Operating like a network surveillance camera, SilentRunner Sentinel allows you to monitor, capture, analyze and graphically visualize network traffic to see exactly what is happening on your network during a proactive audit or cyber investigation. By watching network communications from a high-level, patterns and communication paths will be uncovered that allow you to zero in on suspicious activity, such as policy violations, internal collusion, bandwidth overuse, and questionable in- or outbound connections. Furthermore the visibility gained by using SilentRunner Sentinel enables you to clearly determine the scope and scale of a security breach, as well as proactively identify weaknesses in your security configurations. In addition, you can play back events from thousands of communications to validate a threat and perform root cause analysis. SilentRunner Sentinel dramatically enhances your incident detection and response capabilities, giving you the power to see what your signature-based tools cannot.
Detect what Signature-based Tools Can’t See
SilentRunner graphically illustrates communication flows to swiftly expose anomalies, illegal connections, and security and network problems. The time sequencing function allows you to identify network communication “habits”, anomalies and specific events. Being able to see these anomalies is a must have for detecting malware, malicious insiders and advanced persistent threats that have circumvented your perimeter defense and alerting tools.
Catch What DLPs Miss
When anomalies are identified you can drill down into the content to see exactly what is happening — for example credit card numbers being chatted outside the network or somebody visiting unauthorized websites.
Root Cause Analysis
Reconstruct events, playing back incidents in real time to determine the origin of a threat, see how it is propagating and quickly identify all compromised assets.
Network Compliance Auditing
Proactively perform network compliance audits to facilitate compliance with regulations such as FISMA, HIPPA, ISO 1779, SOX\GLB, and PCI standards.
Monitor Laptops, Even When They Aren’t Logged into Organization’s Network
With typical network forensics tools, once a laptop leaves the organization’s network, you’re blind. But SilentRunner now has a host-based analysis capability that allows you to monitor traveling employees’ internet activity, even if they are using their company laptop on public wifi.
Network Forensics Software for Real-Time Capture and Visualization
- High-performance collection of network speeds up to 10 Gbps.
- Real-time network data is recorded into a central knowledge base that can be queried.
- Load custom filters, for example, an Excel spreadsheet with 2000 IP addresses.
- See internet activity, even on assets that are not logged into your network.
- Play back captured VoIP calls in seconds.
- Build threat profiles to monitor for recurrence of known threats.
- Receive real-time email alerts.
- Automatically restarts failed services without user intervention to reduce downtime.
- Several data retention options to define the length of time that data will be retained and active in the database.
Correlate Network Traffic with Event Logs and Alerts
Visualize firewall events, logs from alerting technologies and pertinent network data surrounding a suspicious incident to validate the threat and perform root cause analysis.
Content and Pattern Analysis
- Determine the exact behavior of a suspect by viewing their network usage patterns and which content they’re accessing.
- Build “integrated maps” of assets or users to see after-hours usage spikes and anomalous data traffic to identify malware, malicious insiders and advanced exploits that cannot be seen by signature-based perimeter defense and alerting tools.
- See how proprietary or inappropriate information proliferated independent of keyword or linguistic matching.
- Use interactive graphical representations to efficiently analyze users, hosts, domains, applications, protocols and addresses — detecting changes or abnormalities from established network baselines.
On-demand Security Incident Playback and Analysis
SilentRunner Sentinel stores and catalogs network data into a central repository allowing you to play back the exact sequence of events to ensure effective and accurate investigations. Web reconstruction reporting: keyword searches, file transfers, video files and more, within captured Web traffic.
Our experienced team can provide in depth product or service explanations as well as, schedule a demo, and/or price quotes. You can expect a reply within 24-48 hours.
For an immediate response please contact us at: Domestic US: 800.574.5199 | Int’l: +44(0)20 7010 7800.