Data Center is our focus

We help to build, access and manage your datacenter and server rooms

Structure Cabling

We help structure your cabling, Fiber Optic, UTP, STP and Electrical.

Get ready to the #Cloud

Start your Hyper Converged Infrastructure.

Monitor your infrastructures

Monitor your hardware, software, network (ITOM), maintain your ITSM service .

Our Great People

Great team to support happy customers.

Friday, May 10, 2013

Anda bisa membeli sistem perangkat mahal, tapi sulit memonitor keamanan sistem Anda?


Hari ini saya bertemu dengan calon Client yang memiliki infrastruktur yang cukup baik, tetapi tetap saja data dari perusahaannya dapat keluar dan diambil oleh orang lain. Hal ini membuat nya risau. Ternyaman investasi yang telah dilakukan nya dengan beragam peralatan dan software aplikasi yang canggih tetap saja dapat dijebol dengan mudah.

Saya menyarankan dia untuk mencoba produk Security Manager plus, produk yang digunakan terus menerus untuk memeriksa kemungkinan kebocoran sekuriti jaringan sehingga beragam jenis kebocoran sekuriti komputer dan jaringan dapat dimonitor lebih awal.


What is Security Manager Plus?

Security Manager Plus is a network security scanner that proactively reports on network vulnerabilities and helps to remediate them and ensure compliance. With vulnerability scanning , open ports detection , patch management , Windows file/folder/registry change management and vulnerability reporting capabilities, Security Manager Plus protects the network from security threats and malicious attacks.

What problems does Security Manager Plus solve?

Security Manager Plus provides detailed inventory of the network assets, assesses network vulnerabilities and identifies devices that are exposed. By deploying missing patches/updates and service packs, Security Manager Plus automatically remediates some open threats to the systems. Security Mananger Plus also provides solutions to mitigate risks and secure IT environment and generates comprehensive audit reports for compliance and understanding.

What features does Security Manager Plus offer?

Who can use Security Manager Plus ?

Security Manager Plus is an enterprise class software and can be used by :
  • Enterprises
Small, medium and large enterprises of different verticals with an eye to secure their network infrastructure
  • Independent Security Consultants
Consultants who are engaged by organizations to offer advice & other security services
  • Security Service Providers
Service Providers who offer vulnerability management as a service over the internet to their customers

What platforms/vendors/technologies does Security Manager Plus support?

Platforms: Windows and Linux
Vendors: Microsoft, Red Hat, Debian, CentOS

What are the various Editions of Security Manager Plus?

Standard Edition

Security Manager Plus Standard Edition has
  • Windows patch management
  • Linux patch management
  • Patch management reporting
  • Manage over internet

Professional Edition

Security Manager Plus Professional Edition has
  • All features of Standard edition
  • Network vulnerability scanning & reporting
  • Windows file & registry change management
  • PCI DSS Compliance reporting
 

Thursday, May 09, 2013

Strategi Kompetisi Ala Richard Branson

November 29, 2012 | By Sigit Kurniawan+

Sumber Ilustrasi: http://www.csmonitor.com/var/ezflow_site/storage/images/media/images/1221-richard-branson/9231452-1-eng-US/1221-Richard-Branson_full_600.jpg

Dalam bisnis, kompetisi tidak terelakkan. Peran kompetitor justru membantu perusahaan dalam mengedukasi pelanggan. Persoalannya, ketika pelanggan sudah begitu teredukasi, sementara pemain-pemain baru bermunculan, apa yang harus diperhatikan perusahaan? Mengamati dan mencermati kompetisi itu penting, tapi jangan sampai energi habis untuk memikirkan apa yang dilakukan oleh kompetitor. Paling tidak inilah yang disarankan oleh pebisnis nyentrik Richard Branson dalam kolomnya di situs Majalah Entrepreneur.

"Banyak pemimpin bisnis menghabiskan waktu untuk mengamati kompetisi dan justru tidak fokus apa yang sudah mereka kerjakan. Sebab itu, lebih baik, bila pemimpin itu membangun budaya inovatif di dalam perusahaannya," kata Richard Branson.

Richard Branson menawarkan tiga langkah inovatif untuk membangun kekuatan di tengah kompetisi bisnis.

Pertama, perhatikan apa yang pelanggan Anda tidak lakukan. Di Virgin, Richard Branson mengatakan timnya mungkin akan menaruh perhatian besar pada kompetitor ketika sedang mempertimbangkan sebuah usaha baru. Secara khusus, mereka melihat kelemahan-kelemahan umum yang ada di dalam industri. Misalnya, mengapa pelanggan tidak puas dengan layanan maupun produk yang tersedia di rak-rak toko. Richard Branson menandaskan banyak keputusan bisnis diambil berdasarkan insting dan pengalaman dibanding berdasarkan angka-angka dan riset pasar. "Ketika memposisikan sebagai pelanggan, kita bisa memahami bagaimana cara untuk memperbaikinya," kata Branson.

Kedua, meniru pesaing mungkin bisa membuat pesaing itu tersanjung dan pengembangan model bisnis yang lebih dari pesaing justru lebih penting. "Pada prinsipnya, kita harus bisa mengembangkan model bisnis yang lebih baik, khususnya yang fokus pada kebutuhan pelanggan," kata Branson.

Ketiga, temukan tempat untuk belajar mengembangkan bisnis dan jadilah seperti pelanggan Anda sendiri. Untuk bisa merasakan apa yang dirasakan pelanggan, sambung Branson, Anda harus bisa memposisikan diri seperti mereka. Termasuk membeli produk dan memakainya. Bila ada sesuatu yang kurang pas, di situlah juga Anda harus memperbaikinya. Branson menandaskan daripada berfokus pada pesaing, lebih baik fokus pada apa yang dibutuhkan pelanggan.

Sementara itu, dalam konteks New Wave Marketing, kajian sebuah bisnis bisa dilihat dengan bingkai pemikiran 5C, yakni Company, Customer, Competitor, Change, dan Connector. Paling tidak, sebagai pebisnis, kita tidak hanya fokus pada salah satu "C" saja seperti yang disarankan oleh Richard Branson tersebut. Pebisnis juga harus memahami apa yang terjadi di dalam diri Customer, di dalam Company-nya sendiri, bisa memahami perubahan-perubahan yang sedang terjadi, memahami apa yang dilakukan pesaing, dan juga bisa menjembatani atau menjadi konektor bagi keempat elemen tersebut.
build-access-manage at dayaciptamandiri.com

Wednesday, May 08, 2013

Database Query Monitor dalam AppManager


Salah satu fitur menarik dari AppManager adalah Database Query Monitor. Hal ini dilakukan untuk mengukur performance database dan aplikasi yang mengaksesnya.

Database Query Monitor

Database Query Monitor
Applications Manager provides out-of-the-box support for availability and performance monitoring of databases through Database Monitoring. However, in a business enterprise, which encompases a wide range of applications and databases, failure in terms of availability or performance would mean not just loss of revenue but also lowering customer satisfaction. In such business applications, availability of specific business metrics becomes critical. Database Query Monitor is primarily used to monitor such specific business metric(s).

Monitoring Business Metrics

Making informed decisions can happen only if all available data is at hand. In order to obtain this data, the user must therefore ensure that those metrics which are critical to making business decisions are available in an instance, 24x7. These metrics are generally stored in various databases. Using Database Query Monitor, the user can monitor these metrics continuously and readily avail the data as and when required. As it is query-based monitoring, it provides a lot more flexibility while monitoring these metrics.

Additional Performance Metrics

Applications Manager Database Monitoring provides a comprehensive and in-depth monitoring of availability and performance of various types of databases. In addition, Applications Manager Database Query Monitor allows the user to monitor additional performance metrics which maybe be needed from time to time to ensure full time availability of critical business applications.

Performance of a Query

Let us assume that in an enterprise, one of the network is experiencing a performance issue. The bottleneck can arise either because there is a problem with the application(s) or one of the database(s). Using Database Query monitor, user can execute a given set of queries and analyze the result. Based on which the user can deduce whether the problem exists with one of the database(s). The result includes the execution time (time taken by the query to generate the result). If the execution time is above a certain pre-assigned threshold value,then the user can deduce the issue is with the database.
Applications Manager also provides the ability to compare various business metric in the output by attribute types.
Applications Manager Database Query Monitor allows user to monitor specific business metrics, generate alarm and execute an action when it is down and generate reports on its availability in a single web console. This allows greater flexibility and eases day-to-day operations for the user.
The Database Query monitor supports the queries of following databases:
  • My SQL
  • Oracle
  • DB2
  • MS SQL
  • Sybase
  • Postgres
For more information, refer Database Query Monitoring Online Help

Tuesday, May 07, 2013

OZEKI bisa digunakan untuk SNMP monitoring

Seringkali kita hanya memerlukan monitoring alert via SMS dari perangkat kita yang mendukung SNMP, biasanya seperti active-devices atau UPS. Solusi simplenya adalah menggunakan SNMP dan mengirimkan status alertnya via SMS dengan menggunakan OZEKI.

Berikut adalah cara settingnya.


SNMP with Ozeki NG SMS Gateway


(Requires Ozeki NG SMS Gateway v4.2.9 or newer release)


In this guide, you can find information on how to setup SNMP monitoring for Ozeki NG SMS Gateway. The SNMP monitoring feature of Ozeki NG makes it possible for you to query information about your Ozeki NG SMS Gateway installation through the SNMP protocol. For example it makes it possible for you to find out if an SMS Service Provider connection (IP SMS or modem connection) is on-line or not. You can also monitor which users have large message queues. Please note, that this feature is only available in Ozeki NG SMS Gateway 4.2.9 or above.

The guide gives you step-by-step instructions on how to setup SNMP support in Ozeki NG SMS Gateway. These steps are useful if you want to integrate Ozeki NG into your corporate network management system.

Prerequisites

If you work with SNMP you probably use some kind of a network management software. For example you can use Nagios, HP Openview, Novell NMS, IBM NetView or Sun Net Manager. If you don't have a network management software available, you can make simple SNMP requests with an SNMP utility. For example most linux distributions provide a command called snmpget and snmpwalk, and for windows, you may download a simple SNMP client, such as the SNMP eye tool.

How does it work?

Ozeki NG has a built-in SNMP Monitoring Agent which provides SNMP monitoring service to you clients. When your network management software send an SNMP get request to the Ozeki NG SMS Gateway OID, the request will be forwarded to the Ozeki SNMP Monitoring Agent, that will get the data from Ozeki NG (Figure 1).

Figure 1 - SNMP Get request

How to use it?

At first, you need to enable the SNMP Monitoring Agent in Ozeki NG in the SNMP tab in the Server Preferences menu (Figure 2) - you need to check the Enable SNMP Monitoring Agent checkbox to start the SNMP Monitoring Agent.

Figure 2 - SNMP Monitoring Agent
There are two parametres of the SNMP Monitoring Agent you can configure. The first is the UDP port the SNMP Monitoring Agent will use to listen to SNMP requests - you can set this port number in the SNMP listening port (UDP) field.
In the Community name field, you can enter the community name that is used to identify the SNMP community which Ozeki NG belongs to.
After you have configured everything properly, you can start sending SNMP GET requests to the Ozeki SNMP Monitoring Agent. The above mentioned SNMP eye tool is good to try sending some SNMP requests to the Monitoring Agent. You just need to enter the IP Address of the Agent (e.g. the IP Address of the machine running Ozeki NG SMS Gateway), the proper community name (ozekimonitoring in this case), and at least one appropriate OID (Figure 3). Note, that OIDs must start with a dot ("."). The OIDs you can use can be found on the page MIB.

Figure 3 - SNMP Eye Tool
After sending the SNMP GET request to the SNMP Monitoring Agent in Ozeki NG SMS Gateway, it sends back the information requested (Figure 4).

Figure 4 - SNMP Eye Tool - response
Dig deeper!
People who read this also read...

Selamat kepada BPS yang telah memilih OZEKI SMS GATEWAY

Selamat kepada BPS, kami bangga melayani Anda.


Ozeki NG SMS Gateway for corporate users

This is an excellent software for those who want to create SMS services in their corporate IT system!
Ozeki NG - SMS Gateway is the best software product for sending SMS notifications and for building automated SMS information retrieval services. It can be installed on Windows and on Linux systems and it can be used to send and receive SMS and MMS messages. It provides various interfaces. Check out some of the most popular ones:

Software developers:
JAVA sms example
PHP SMS example
C# SMS example
VB.net SMS example
ASP SMS example
Delphi SMS example
C++ SMS example
      Business users:
Send SMS from your SQL database
Send SMS using HTTP requests
Send SMS from E-mail
Send SMS with a command line tool
Send SMS using txt files

If you want to use mobile messaging in your company, the best practice is to setup an SMS gateway on one of your servers to handle all your mobile messaging needs. This SMS gateway can be connected to the mobile network through a wireless link, by using a GSM modem or through the Internet (Figure 1). It will provide a central point of access for your office users and your IT system when they want to use mobile messaging. This way you can avoid the chaos independent SMS service subscriptions can cause over time.

Figure 1 - Connect your system to the mobile network. 

Wireless connection to the mobile network
wireless connection can be setup by attaching a GSM phone or GSM modem to your computer with a data cable. After the phone (or modem) is attached, Ozeki NG SMS Gateway needs to be configured to operate the phone. When you setup this kind of connection you will need a SIM card, that you put into the phone (or modem). When you purchase the SIM card from your local mobile network operator, you should select a price plan that offers good prices on SMS. A wireless connection will allow you to send up to 10000 SMS messages per day. If you need greater performance, you should consider to use an IP SMS connection or more than one modem.

Internet based connection to the mobile network

If you wish to connect your SMS gateway to the mobile network through the Internet (in other words you want to use an IP SMS service), you should find an IP SMS service provider. This service provider will give you connection details after you sign up for it's service. When you select a provider make sure to find one, who is able to provide SMS over SMPP. SMPP is the best protocol for SMS messaging over the Internet, because it is asynchronous, fast and reliable. After you have signed up for the service, you need to configure the SMPP service provider connection in Ozeki NG SMS Gateway. The advantage of an IP SMS connection, is that it offers much higher throughput. The disadvantage is that it is often more expensive to send SMS messages this way, then by using a wireless link.

Documents
Ozeki NG Datasheet (pdf)
Ozeki NG Product Guide (pdf)
Ozeki NG Installation guide (pdf)
Guide for SQL developers (pdf)
Overview for software developers (ppt)
ISV/OEM information (pdf)
Why it pays off to use Ozeki NG - SMS Gateway
    Information for system integrators

Useful information for IT network operators is available at sms-integration.com. On this site you can find information on How to use Microsoft Operations Manager (SCOM 2007, MOM 2005) to send SMS alerts on various events. Other systems, such as HP Openview, IBM Tivoli, Whatsup Gold are also covered.

Recommended hardware

To build a reliable SMS system, you need a professional GSM device. Check out the supported GSM modems page to see what we recommend you to use!

Licensing Network Monitoring PRTG

Bagaimana sih perhitungan license PRTG ? Berdasarkan jumlah SENSOR bukan DEVICE. H


The licensing options are based on the number of sensors. Each of the following items counts as one sensor:
  • Monitoring traffic/bandwidth on one port of any device via SNMP (e.g. switch, firewall, server) using the MIB2 standard
  • Monitoring errors/min, unicast packets/s, non-unicast packets/s on one port of a device via SNMP using the MIB2 standard
  • Monitoring one other system parameter via SNMP (e.g. CPU, diskspace etc.) that is accessible via one OID value
  • Monitoring traffic going through one local network card (NIC) via Packet Sniffing. If you use filtering then each set of filters counts as one sensor.
  • Monitoring of one stream of data traffic via xFlow (NetFlow, sFlow) Monitoring. If you use filtering then each filterset counts as one sensor.
The number of actual hardware devices is not taken into account at all, only the number of sensors. For the "unlimited licenses" the number of sensors that can be monitored is not programmatically limited by the software itself, but may be limited by your software, hardware and network.


Apa saja yang tersedia ?


Licenses of PRTG differ by two parameters:
  • The maximum number of sensors.
  • The number of allowed core server installations.
PRTG LicenseSensorsNumber of core server installations
PRTG 1001001 (plus 1 for Failover Node in Cluster)
PRTG 5005001 (plus 1 for Failover Node in Cluster)
PRTG 10001,0001 (plus 1 for Failover Node in Cluster)
PRTG 25002,5001 (plus 1 for Failover Node in Cluster)
PRTG Unlimitedunlimited1 (plus 1 for Failover Node in Cluster)
PRTG Corporateunlimitedmultiple within one corporation *
* The Corporate License allows multiple installations of the core server in different
sites of one corporation in one country.

Monday, May 06, 2013

Selamat kepada ECOGREEN yang telah memilih solusi Netflow Analyzer

Selamat kepada ECOGREEN yang telah memilih solusi Netflow Analyzer untuk monitoring trafik jaringan.

Kami bangga melayani Anda.

Selamat kepada BII yang telah memilih solusi Netfow Analyzer

Selamat kepada BII yang telah memilih solusi Netflow Analyzer. Netflow Analyzer sangat powerful untuk monitoring trafik dan sekuriti jaringan.

Kami bangga melayani Anda.


Device apa saja yang disupport Netflow Analyzer ?


NetFlow Analyzer - Supported Devices

NetFlow Analyzer leverages on NetFlow®, sFlow®, cflowd®, J-Flow®, IPFIX®, NetStream® and Cisco NBAR® information exported from routing & switching devices to provide you indepth visibility into the top talkers and applications on your network. The table below lists the set of devices from various vendors and the type of flow they export.
NetFlow Analyer partner image
VendorSupported FlowsDevice List
CiscoTraditional NetFlow
(NetFlow v5)
ASR 1000, Cisco ISR G1 and ISR G2 models (800, 1800, 1900, 2800, 2900, 3800, 3900), 1700, 3660, Catalyst 4500, Catalyst 6500 with Sup 32 and Sup 720, Cisco 7500, 7600, 10000, 12000, Cisco ASA (IOS version 8.2 onwards)
Flexible NetFlow
(NetFlow v9)
ASR 1000, ASR 9000, Cisco ISR G1 and ISR G2 models (800, 1800, 1900, 2800, 2900, 3800, 3900), CRS-1, C3KX-SM-10G, Catalyst 4500 and 4500X with Sup 7, Catalyst 6500 with SUP2T, XR12000 / 12000 Series Routers, Cisco 7200, 7300, Nexus 1000V, Nexus 7000
Nexus 3000 series(supports sFlow)
AdtranNetFlowNetVanta 3200, 3305, 4305, 5305, 1524, 1624, 3430, 3448, 3130, 340, and 344
AlaxalA NetworkssFlow
AX7800R , AX7800S , AX7700R , AX5400S Refer AlaxalA Networkswebsite
AlcatelsFlowOmniSwitch 6850 , OmniSwitch 9000
Allied TelesissFlow
Brocade (Formerly Foundry Networks)NetFlow, sFlow
BigIron series, FastIron series, IronPoint series, NetIron series, SecureIron series, ServerIron series
BarracudaIPFIX
Barracuda NG Firewall(firmware 5.2.3 and above)
Comtec SystemssFlow
!-Rex 16Gi & 24Gi & 24Gi-Combo
Dell - Force 10 NetworkssFlowPowerConnect 6200 series, PowerConnect 8200 series, E series
D-LinksFlowDGS-3600 series
EnterasysNetFlowRefer Enterasys website
Extreme NetworksNetFlow
FortigatesFlowFortiSwitch seriesFortiGate series
HuaweiNetStreamRefer Huawei website
H3CsflowRefer H3C website
RuijieIPFIXRefer Ruijie website
Hewlett-PackardsFlowProCurve 2610 series, ProCurve 2800 series , ProCurve 2900 series, ProCurve 2910al series, ProCurve 3400cl series , ProCurve 3500yl series , ProCurve 4200vl series , ProCurve 5300xl series , ProCurve 5400zl series , ProCurve 6200yl series , ProCurve 6400cl series , ProCurve 6600 series, ProCurve 8212zl, ProCurve Wireless Edge Services xl Module, ProCurve Wireless Edge Services zl Module, ProCurve Access Point 530ProCurve 9300m series , ProCurve Routing Switch 9408sl (http://www.sflow.org/products/network.php )
HitachisFlowGR4000 , GS4000 , GS3000
Juniper Networks
NetFlow, J-Flow
Refer Juniper Networks website
MaipusFlow
MikroTikNetFlow
Refer Website
NetGearsFlowGSM7352S-200, GSM7328S-200
NortelIPFIX5500 & 8600 Series
NECsFlowIP8800/R400 series , IP8800/S400 series , IP8800/S300 series
Palo AltoNetFlowFirmware version 4.1
RiverbedNetFlowRiverbed and NetFlow Analyzer Joint Solution brief [PDF] | ReferRiverbed website
SonicwallNetFlow/IPFIXSonicWall NSA E5500(SonicOS Enhanced 5.6.4.0-36o and above)
VyattasFlowVyatta 514, Vyatta 2500 series, Vyatta Virtual Router, Firewall, VPN

For queries on working with other devices contact netflowanalyzer-support@manageengine.com

Menggunakan kemampuan Advanced Security Analytics Module (ASAM) di Netflow Analyzer untuk analisa sekuriti jaringan

Dalam produk Netflow Analyzer, ada salah satu modul ASAM yang digunakan untuk melakukan analisa sekuriti jaringan.
The neural system of most of the enterprises is the network. With the emergence of social networking, video streaming, peer-to-peer technology, cloud computing and SaaS, it's safe to say that modern enterprises are only as good as their networks especially in terms of the bandwidth and security they provide. Be it banks securing their data against thefts or business organizations securing their network against security threats and attacks, the lurking threat of getting breached, compromised and damaged by an unknown zero-day intruder is always relevant. Moreover, continuous evolution of intrusion techniques has made the task of ensuring network security increasingly difficult in spite of becoming all the more critical.
Predominantly, the security systems are classified into three types. They are (i) Firewall Systems, (ii) Intrusion Detection/Prevention (IDS/IPS) Systems and (iii) Network Behavior Analysis (NBA) Systems also known as Network Behavior Anomaly Detection (NBAD) Systems. While all three of them have their own unique strengths and weaknesses, they complement each other to form a holistic network security strategy. However, the first two are widely prevalent and perceived as essential components, the third is not so. This leaves the network vulnerable to several zero-day attacks, unknown worms, internal threats, etc., as well as letting them lag behind in terms of overall traffic visibility, access policy decisions, security posture assessment and a reasonably sure confirmation of network security.
Comprehensive Enterprise Network Security:
comprehensive enterprise network security

Unified bandwidth monitoring and zero-day security analytics

Bandwidth monitoring & traffic analysis and network security analytics & behavior anomaly detection are interdependent and complementary by nature. NetFlow Analyzer, coupled with ASAM, unifies these complementary solutions to provide a holistic and reliable decision support system in a single user-friendly interface. While NetFlow Analyzer gives you an in-depth visibility in to your network traffic and bandwidth utilization, ASAM offers continuous network security monitoring and anomaly detection capabilities.
Unified Traffic Analytics:
one holistic view

Advanced Security Analytics Module (ASAM)

Advanced Security Analytics Module is a network flow based security analytics and anomaly detection tool that helps in detecting zero-day network intrusions, using the state-of-the-art Continuous Stream Mining Engine™technology, and classifying the intrusions to tackle network security threats in real time. ASAM offers actionable intelligence to detect a broad spectrum of external and internal security threats as well as continuous overall assessment of network security (Network Security screenshots).
ASAM Technological Significance:
asam benefits
The Security Snapshot of ASAM displays a list of grouped threats/anomalies as problems and further, the problems are categorized in to three major problem classes (Bad Src-Dst, DDoS, Suspect Flows). The set of classes used for classifying problems with a brief description is given here (Problem Taxonomy). The pie charts and line graphs help the user grasp the overall network "security posture" in one glance. On further drill-down it displays a list of individual events/anomalies, of a specific problem, with detailed information collation for closer investigation by the operator.
ASAM, offered as a simple add-on module of NetFlow Analyzer, leverages the underlying platform's agentless centralized data collection and forensic analysis capabilities, to offer greater value. NetFlow Analyzer is a robust, scalable and a proven platform offering bandwidth monitoring and unified traffic analytics.

Benefits of ASAM:

  • Centralized agentless traffic data collection, analysis and management
  • Seamless visibility into both external and internal security threats
  • Context-sensitive zero-day intrusion / anomaly detection capabilities
  • Continuous overall security posture assessment
  • Proactive feedback-driven access and traffic policy decisions
  • Actionable and real-time decision support system

Technical Capabilities:

  • High throughput & low latency Stream Processing
  • Asynchronous and parallel data processing
  • Rapid Rules Engine and flexible criteria profiles
  • Contextual resource modeling and problem heuristics
  • Advanced event correlation and mining algorithms

Features:

Network security snapshot
Auto Discard Flows
  • Whitelist specific flows for specific problems
  • Extensive flow filter configuration options
  • Consolidated Discard Filter configuration reporting

Network security snapshot
Event Troublshoot Report
  • Ad-hoc forensic investigation and analysis
  • Groups flows for quickly discerning patterns
  • Segment flows by originating router

Network security snapshot
Custom Problem Management
  • Enable ⁄ Disable specific problems and algorithms
  • Focus in pertinent problems of interest

Network security snapshot
Auto Ignore Events
  • Whitelist specific resources for specific problems
  • Option to store ignored events for auditing
  • Consolidated Ignore Filter configuration reporting

Network security snapshot
Security Snapshot
This displays a list of grouped threat⁄ anomaly as a problem and further, the problems are categorized in to three major problem classes (Bad Src-Dst, DDoS, Suspect Flows). Read more...

Network security event list
Event List
The ‘Event List’ in ASAM lists, classifies and organizes all the events that might become attacks. Also, ASAM assigns severity of an event; this allows you to prioritize your actions. Read more...

network security event details
Event Details
Event details gives a thorough detail about the problem. The details include network, port, protocol, TCP flag and much more. Clicking on the router name gives details with mapped destination- source IP and the application, port, protocol etc. used. This report can be exported as a pdf or can be mailed with just a single click.