Select Page

Re-inventing Firewall Log Analytics

Graphical Threat Visualization

No more Firewall Log Loathing

Real-time Executive Dashboard
The executive dashboard provides an easy to read, consolidated view of all security activity. Customizable views allow you to display information according to specific firewall event categories, or only what is applicable and relevant to you. View only what you want; leave out what you don’t need!
Filter your results.
With “at-a-glance” reporting that shows multiple summaries on a single page, you can easily drill down for more detail to analyze data across multiple devices without creating custom reports.
Customizable Gadgets
You can modify the dashboard to bring forward those firewall event logs that require attention, all visualized with simple to create, edit, and read gadgets. Just like adding apps to your smartphone screen, this places your most frequently used or most useful functions close at hand.

Actionable Security Insights with Firewall Monitoring

Don’t react. Act! Never take security related decisions in a vacuum again.

Stay on Top of Security Events
Each security event means something. It could be benign or a serious threat. Many events need no response, some are maintenance issues, but there will still remain a few threats that need immediate interdiction. Eliminate guesswork, know which events to respond to and when.
Empower Your Decision-Making with a 360-degree View
A security event does not exist in a vacuum. Multi vector attacks may combine virus and vulnerability exploits that needs correlation of event data from multiple sources. Each event is presented in a rich information context that correlates with attack, virus, and other contextual messages including source and destination event data to give you the maximum insight into your situation.

Detailed, Insightful 360-degree Situational Awareness

Visualize, analyze, isolate. Get the information you need on any of these metrics by source or destination IP address, source/destination port and protocol, event message, event categories and more.

Antivirus Reporting
Generate reports on thousands of different virus, worm, trojans, spyware, and other malware. Even better, identify their presence by exact location in the network- find out exactly which nodes are infected.
Spam Reporting
Generate correlated reports on email spam for all mail protocols. Firelytics also features intelligent spam tracking and reporting- the software can classify a sender or group of senders as spammers including analysis of their past email-sending habits.
Intrusion Detection System (IDS) Reporting
IDS reporting allows generation of reports on hundreds of attack and anomaly signatures to help security administrators get a comprehensive view of intrusions and rule violations. Firelytics exploits the deep-packet inspection (DPI) capability of unified threat management devices to detect malware masquerading as genuine network traffic.

Analyze User Browsing Behavior

User specific details on users browsing behavior overtime correlated with productivity data helps you identify loopholes that you can plug.

View Activity Patterns by IP or User
Monitor and record exactly which sites your users are visiting. You can view all users browsing patterns according to their IP address, or  username names if your firewall supports authenticated logins.
Monitor Productivity
Track browsing patterns by time and content visited. Are your employees using company resources for personal activity when they should be working? View full drill down of domain and server content pages visited, actually visit the same pages that they did!

 

Web Content Categorization
View specific categories (like porn, shopping, mail, games); view the specific user accessing each category and at what times. Remember these views are not cast in stone, create your own or modify the existing ones as you wish.

 

Signing up is easy and fast. Give it a try!

UTM Firewall Device








Firelytics Account Sign up

Signing up is easy and fast. Give it a try!

UTM Firewall Device

Great! Next Step is App Registration and you\\\'re done!