Get Started Free!

We welcome Fortinet and Cyberoam users to full Firelytics Firewall Analyzer support!

Not on Fortinet or Cyberoam? We are working hard to support your device, please sign up and we’ll let you know as soon as we’re ready. Your account will be provisioned and ready to go.

* = required field
UTM Firewall Device











Blog Archives

The New Reality of Firewall Log Analysis

Firewall log analysis used to be a simple endeavour.  The logs were generated by perimeter firewall with relatively few functions.  Logging into the console of the firewall would permit a security administrator to perform firewall log analysis right on the more »

Tagged with: , , ,
Posted in Blog

Waterloo Systems Expands Firewall Log Analyzer for Fortinet with new MonitorMyFortiGate

Enhancements for FortiGate logging are described and available via the site newly dedicated as MonitorMyFortiGate.com 21-January-2014 – Ogdensburg, New York — Waterloo Systems, a cutting-edge developer of SaaS-modeled security monitoring and analytics solutions, has announced expanded support for Fortinet FortiGate more »

Posted in Blog

Defense Strategies: Intelligent Security Perimeters – Part 3

This post concludes our series on the exciting potential for Intelligent Security Perimeters for network protection. Qualitative analysis of traffic that goes beyond simple SIEM reporting raises the situational awareness of IT administrators through a qualitative predictor. We’ll now examine more »

Posted in Blog

Qualitative Analytics: Intelligent Security Perimeters – Part 2

In our previous post we presented reasons that Intelligent Security Perimeters are evolving in order to address a new proliferation of so called Advanced Persistent Threats (APTs). The result is effectively an arms race between perimeter defenses like Firewall Log more »

Posted in Blog

New Horizons In Intelligent Security Perimeters: Part 1

Traditionally, Security Event and Information Management (SIEM) was exclusively the domain of large scale enterprises with thousands of nodes and large budgets. Recently, with advancements in programming techniques and efficient tools to manage big data, a new generation of firewall more »

Posted in Blog