Threat Detection


Scalable flow collection

using Machine Learning and Big Data to simplify

Network Applications Management

and radically improve

Anomaly and Threat Detection

and Cyber Security Investigations

Advanced Cyber Security and Attack Detection

Network Behavior Anomaly and DDoS Detection

Automated A.I. Detection
The longer it runs, the smarter it becomes

Threat Intelligence

Global Knowledge - Local Intelligence


Analyze every conversation

Performance Analytics

Real-Time Performance Analytics

Scalable, Flexible and Granular
Bandwidth Monitoring, QoS, 95th Percentile,
Virtualization Analysis

ISP, MSP, Campus, Global infrastructure

Peering Analytics (ASN)
Billing and Network Segmentation
Distributed hierarchical collection and query

Network Intelligence
you can depend on

Netflow Auditor provides network and security teams the fastest and most scalable and granular flow-analytics solution available globally with superior and speedy contextual network traffic accounting reporting and alerting. Engineering excellence delivers to you unsurpassed collection, correlation, granular data retention and diagnostics that automatically extract deep intelligence from huge flow data to quickly detect threats, network misuse and malicious traffic categorizing and qualifying the seriousness of an anomalous network traffic event.




Using scalable collection of NetFlow, IPFIX and sFlow to monitor pervasively, Netflow Auditor’s unique granular forensics, anomaly detection, threat intelligence, performance and visual analytics eliminate network blindspots to discover and thwart cyber-attacks, DDoS, Ransomware, APT and Insider Threats with complete application performance, bandwidth, QoS and traffic accounting analytics enabling security and other network issues to be quickly identified accelerating incident response and reducing enterprise risk in even the most challenging environments.

Statistics Source: Security Intelligence via IBM


Unique Abilities for Ultimate Visibility

Integrated Cyber Network Intelligence

Complete solutions to detect, analyze, and alert to defend against known and unknown emerging threats with complete forensic visibility

Quality Solution

Unique Scalability

Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.

Uniqueness of approach begins at data capture with Netflow Auditor’s highly scalable collection, archival correlation and hierarchical methods that enable granular data retention from huge flow data streams or from hundreds of distributed physical or software defined networking devices. Granular retention provides the ability to extract deep intelligence enabling automated data-mining diagnostics to detect malicious traffic and repeat offenders and categorizes and qualifies the seriousness of an anomalous network traffic event.

NetFlow Auditor constantly keeps its eyes on your Network and provides total visibility to quickly identify and alert on who is doing what, where, when, with whom and for how long. It learns network behaviors and detects and alerts on anomalies and finds hosts conversing with suspect ransomware, botnets, tor, illict sharing and more..

Scalable Netflow - 3 key questions to ask

Netflow Auditor scales from largest to smallest networks in architecture and licensing and is therefore suitable for enterprises of any size. It is used by organizations of all sizes such as councils, utilities, banking, universities and all tiers of telcos and managed services. Multinationals, large corporates, ISPs, government, health care, finance houses, campuses and other large networking infrastructures will particularly appreciate our scaling ability.

We look forward to you experiencing why we've made many other customer's lives very easy with our smart alerting and actionable intelligence and the scalable benefits only NetFlow Auditor can provide.

Scalable & Granular

Superior collection technology for volumes of sustained and burst flows per second. Superior archival technology for depth of collection and hierarchical or clustered views from multiple collectors.


Provides a comprehensive Intrusion Detection (IDS) and security and information event management (SIEM) solution as it gathers, analyzes and presents granular information from multiple network and security devices with comprehensive log auditing, review and incident response.

Real-time & Trending
Supports both Real-time and Trending analysis of Usage, Packets, Conversations and 95th percentiles for network behavior anomaly detection, security forensics, capacity planning and billing purposes.

Fully supports IPv6 for analytics and billing and includes a comprehensive MAC Address translation for BYOD analytics.

Security orientated with Advanced Network Behavior Anomaly Detection (NBAD), NBAR, DDoS detection, P2P detection, blacklists and advanced Application Mapping.

Flow Collection

Report on Cisco NetFlow, sFlow, jFlow, IPFIX, AppFlow, NetStream. Support for Cisco Routers and Switches, Cisco Adaptive Security Appliance (ASA), Cisco Aggregation Services Router (ASR), Cisco Wide Area Application Service (WAAS), Cisco Nexus, Cisco Medianet, Cisco Wireless LAN Controller (WLC), Checkpoint Firewalls, Routers and Switches such as HP, 3COM, Juniper, Mikrotik, sniffers such as Ixea, Gigamon, nProbe (plus extended DNS, HTTP, SIP, SQL), VMware, Citrix, Fortinet, Barracuda, Alcatel, RAD and more

Total Network Visibility
  • Understand the impact of voice, viruses, hacking, multicast, DNS, peer-to-peer (P2P) and worms on your network.

  • Pro-actively manage and troubleshoot network and application performance issues on even the largest of environments.

  • Identify Bandwidth utilization and abuse and Justify bandwidth upgrades. Accurately plan network changes and new application roll-outs.

  • Validate WAN Optimization schemes with pre-post deployment assessments.

  • Monitor and managing service level agreements

  • Ensure usage policies are enforced.

  • Archive information for regulatory and compliance requirements.

  • Analyze Peering traffic analysis

  • Capacity Plan and forecast capacity requirements

  • Pro-actively manage and troubleshoot network and application performance issues

  • Reduce costs by substantially speeding up Mean Time To Repair (MTTR) and recovery using Automated Diagnostics and Comprehensive Traffic Accounting

Network Super Vision

Bring your Network into Focus