Network and Cloud Super Vision
  • Software
    • Network Forensics
    • Baselining
    • Performance
    • IPv6
    • DDoS Detection
    • Features
    • Threat Intelligence
    • Solutions
  • Resources
    • Knowledge Base
    • Webinars
    • Whitepapers
      • Identify DDoS Attacks
      • Scalable Netflow – 3 key questions to ask
    • Training
      • Multiview Introduction
      • Forensics Introduction
      • Visual Analytics Introduction
      • IPv6 Introduction
      • Flow Configuration Options
      • Sizing – Planning Disk Space Requirements
      • Data Collection Tuning -Default Real-Time & Long-Term Config
    • Next Steps
      • Download NetFlow Auditor
      • Licensing Options
    • Product Information
      • In a nutshell (pdf)
      • 2020 vision in 2010 (historical pdf)
      • Datasheet (pdf)
      • 100% Raw Flow Collection and Forensics. Application Performance and Scaling (pdf)
    • Brochures
      • Enterprise Networks (pdf)
      • ISP/TELCO/MSP Networks (pdf)
    • Presentations and Galleries
      • Performance Monitoring
      • Anomaly Detection
      • Network Team in a Box
      • Forensics
  • Netflow Configuration
    • Cisco Netflow Configuration
      • Which Routers and Switches Support NetFlow?
      • Cisco NetFlow commands quick start summary
      • Cisco NetFlow Auditor commands explained
      • Cisco Nexus
    • Other NetFlow Configuration
      • Checkpoint Firewall
      • Enterasys
      • Extreme Networks Router
      • Juniper
      • Mikrotik
      • Riverbed Steelhead
      • VMware on an ESX Server
      • Vyatta
      • Adtran NetVanta Router
    • sFlow Configuration
      • Alcatel
      • D-Link xStack DGS-3600 Series
      • Fortinet / FortiGate
    • IPFIX Configuration
      • HP Procurve
      • Nortel ERS 5500 and 8600
    • Troubleshoot why NetFlow Exports are not being received
  • About Us
    • Contact Us
    • Corporate
  • Blog
  • Software
    • Network Forensics
    • Baselining
    • Performance
    • IPv6
    • DDoS Detection
    • Features
    • Threat Intelligence
    • Solutions
  • Resources
    • Knowledge Base
    • Webinars
    • Whitepapers
      • Identify DDoS Attacks
      • Scalable Netflow – 3 key questions to ask
    • Training
      • Multiview Introduction
      • Forensics Introduction
      • Visual Analytics Introduction
      • IPv6 Introduction
      • Flow Configuration Options
      • Sizing – Planning Disk Space Requirements
      • Data Collection Tuning -Default Real-Time & Long-Term Config
    • Next Steps
      • Download NetFlow Auditor
      • Licensing Options
    • Product Information
      • In a nutshell (pdf)
      • 2020 vision in 2010 (historical pdf)
      • Datasheet (pdf)
      • 100% Raw Flow Collection and Forensics. Application Performance and Scaling (pdf)
    • Brochures
      • Enterprise Networks (pdf)
      • ISP/TELCO/MSP Networks (pdf)
    • Presentations and Galleries
      • Performance Monitoring
      • Anomaly Detection
      • Network Team in a Box
      • Forensics
  • Netflow Configuration
    • Cisco Netflow Configuration
      • Which Routers and Switches Support NetFlow?
      • Cisco NetFlow commands quick start summary
      • Cisco NetFlow Auditor commands explained
      • Cisco Nexus
    • Other NetFlow Configuration
      • Checkpoint Firewall
      • Enterasys
      • Extreme Networks Router
      • Juniper
      • Mikrotik
      • Riverbed Steelhead
      • VMware on an ESX Server
      • Vyatta
      • Adtran NetVanta Router
    • sFlow Configuration
      • Alcatel
      • D-Link xStack DGS-3600 Series
      • Fortinet / FortiGate
    • IPFIX Configuration
      • HP Procurve
      • Nortel ERS 5500 and 8600
    • Troubleshoot why NetFlow Exports are not being received
  • About Us
    • Contact Us
    • Corporate
  • Blog

Gain Certainty in Uncertain Times.

Take Control of your network or somebody else will!

It’s what we don’t see that poses the biggest threats and invisible dangers. Netflow Auditor’s unique scalable granular retention employs Threat Intelligence, Machine Learning and A.I. Cyber Forensic Diagnostics to enable unsurpassed visibility and detection with complete historical forensics.

Free 30-Day Trial
Price Quote

Get a Quotation

Price Quote

Why Netflow Auditor ?

Over 95% of network and cyber visibility tools retain as little as 2% to 5% of all information collected!

It doesn’t take much to realize just how critical having absolute network traffic visibility has become to maintaining network health and cybersecurity.

Unique Applications intelligence enables high level awareness dramatically improving network and cloud analytics context and speed to detect and repair. Machine learning and A.I. identify hidden network applications, mitigate network security threats from rogue applications, and reduce network outages.
Leverages economical flow-based analytics substantially reducing costs to secure and manage a network. Flexible data mining and reporting from unique 'small-footprint, big data' enables complete forensics. Eliminates network blindspots enabling security and network issues to be quickly identified.
Massively scalable allowing clustered query across multiple NetFlow Auditor data-warehouses. Uniquely supports both collection and retention of millions of flows per second. Enables organizations of all sizes to monitor at various levels of granularity from simple visibility to full compliance.
Eliminates network blindspots with granular insight and transparency of every transaction. High-granularity retention substantially reduces risk discovering ransomware, malware, p2p abuse and data leakage. Netflow Auditor is the only tool in the flow market place that can provide this critical visibility.
A.I. Diagnostics detects any activity that deviates from normal baselines. Discovers Outliers using dynamic Machine-learning algorithms to provide early warning on DDoS, Anomalous traffic, Advanced Persistent Threats and Insider Threats.
Machine Learning asseses what’s normal and continually monitors and benchmarks identifying problems with speed and finding outliers and detecting vulnerabilities and other network problems. Granular historical baseline analytics enable deep profiling of any aspect of network communications.
Visual Analytics enables you to gain speedy insights into complex data. Visual analytics tools and techniques create an interactive view of data that reveals the patterns within it, enabling everyone to become researchers and analysts.
Logical Network Segmentation simplifies Route and Peering analytics and Usage based billing for ISP, MSP, Government, Campus and Enterprises. Segment and measure bandwidth usage of IP groups such as departments or customers and identify location of alerts and security policy breaches.
Cloud Analytics enables you to go beyond your physical networks and analyze your cloud services too.

Trusted by Fortune 500 globally

Eliminate blindspots with unprecedented Network Visibility and Defense in Depth

Netflow Auditor is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.
Read More
It constantly keeps its eyes on your Network and Cloud and provides total visibility to quickly identify and alert on who is doing what, where, when, with whom, and for how long. It learns network behaviors and detects and alerts on anomalies and finds hosts conversing with suspect ransomware, botnets, tor, illicit sharing, and more.

Scales from the largest to smallest networks in architecture and licensing. Councils, utilities, banking, universities, and all tiers of telcos and managed services. Multinationals, large corporations, ISPs, government, health care, finance houses, campuses, and other large networking infrastructures will particularly appreciate our scaling ability.

We look forward to you experiencing why we’ve made many other customer’s lives very easy with our smart alerting and actionable intelligence and the scalable benefits only NetFlow Auditor can provide.

Free 30-Day Trial

Integrated Cyber and Network Intelligence modules

Designed to run independently or work together as a powerful single unit

Network Behavior Anomaly and DDoS Detection Threat Intelligence Forensics Advanced Cyber Security and Attack Detection Bandwidth, Traffic Accounting, QoS ISP, MSP, Campus, Global infrastructure Peering Analytics, Network Segmentation, 95th Percentile Scalable, Flexible and Granular
Performance Analytics
INTEGRATED
CYBER NETWORK INTELLIGENCE
Network Applications Management Cyber Security Investigations Anomaly and Threat Detection

Cyber Threat Intelligence

Ransomware, Botnets, Infections

Threat Feeds and Correlation

Behavioral Attack Detection

DDoS and Anomaly Diagnostics

Machine Learning and A.I. Diagnostics

Granular Security Forensics

Address security blind spots.

Granular, Scalable and Flexible

Performance Analytics

Absolute network traffic visibility.

Applications Intelligence, QoS, bps

Ultimate Network and Cloud Visibility

Netflow Auditor specializes in providing tools that make proper use of granular flow visibility. It can be scaled up or down to suit your network and cloud architecture and used with the broadest flow capable devices in the market – that’s what makes Netflow Auditor a professional’s choice!
Netflow Auditor provides network and security teams the fastest and most scalable and granular flow-analytics solution available globally with superior and speedy contextual network traffic accounting reporting and alerting. Engineering excellence delivers to you unsurpassed collection, correlation, granular data retention, and diagnostics that automatically extract deep intelligence from huge flow data to quickly detect threats, network misuse, and malicious traffic categorizing and qualifying the seriousness of an anomalous network traffic event.
  • Complete Collection
  • Granular Retention
  • Collection Tuning
  • Broadest Vendor Support
  • Multithreaded
  • Passive collection
  • High Speed Reporting
  • Flexible Templates
  • Hierachical Distribution
  • Single pane of glass analytics
  • Unprecedented Flow Visibility

3 Key Differences Between NetFlow and Packet Capture Performance Monitoring

The increasing density, complexity and expanse of modern networking environments...
Read More

What is NetFlow & How Can Organizations Leverage It?

NetFlow is a feature originally introduced on Cisco devices (but now...
Read More

Deploying NetFlow as a Countermeasure to Threats like CNB

Few would debate legendary martial artist Chuck Norris’ ability to...
Read More

NetFlow Auditor @ CyberTech 2016

Last week we presented NetFlow Auditor at CyberTech 2016 in...
Read More

How to counter-punch botnets, viruses, ToR and more with Netflow (Pt. 2)

Data Retention Compliance   End-Point Profiling Hosts that communicate with...
Read More

The Internet of Things (IoT) – pushing network monitoring to its limits

In the age of the Internet of Things (IoT), billions...
Read More

5 Benefits of NetFlow Performance Monitoring

In today’s global marketplace there has never been more pressure...
Read More

How to Improve Cyber Security with Advanced Netflow Network Forensics

Most organizations today deploy network security tools that are built...
Read More

Insightful e-Books, Business Cases and Videos

Bring your Network into Focus
8 Keys to Understanding Netflow
Security and Performance
DDoS and Ransomware Guide

Scalable & Granular

Uniqueness of approach begins at data capture with highly scalable collection, archival correlation, and hierarchical methods that enable granular data retention from huge flow data streams or from hundreds of distributed physical, cloud, or software-defined networking devices. Granular retention provides the ability to extract deep intelligence enabling automated data-mining diagnostics to detect malicious traffic and repeat offenders.

Superior collection technology for volumes of sustained and burst flows per second. Superior archival technology for depth of collection and hierarchical or clustered views from multiple collectors.

Learn why scalable retention is so critical

SIEM & IDS

Provides a comprehensive Intrusion Detection (IDS) and security and information event management (SIEM) solution as it gathers, analyzes and presents granular information from multiple network and security devices with comprehensive log auditing, review and incident response. Supports both Real-time and Trending analysis of Usage, Packets, Conversations and 95th percentiles for network behavior anomaly detection, security forensics, capacity planning and billing purposes.

Key unique aspects for enahanced security

Broadest Flow Support

NetFlow, sFlow, jFlow, IPFIX, AppFlow, NetStream. Plus extended metadata such as DNS, DHCP, EMAIL, HTTP, RADIUS, SIP, SQL, SSL. 3COM, Alaxala, Alcatel Lucent, Allied Telesis, AppFlow Citrix, Arista Networks, Astaro Firewall, Amazon AWS, Barracuda Firewall, Blue Coat, Crossbeam, Brocade, Check Point Firewall, Cisco ASA Firewall, Cisco ASR, Cisco Medianet, Cisco Wireless LAN Controller (WLC), Cisco Nexus, Cisco Routers and Switches, Citrix Appflow, Cloudshield, D-Link, Dell SonicWALL, DD-WRT, Endace, Enterasys, Ericsson, Extreme, F5, Fortigate Firewall, Fortinet Firewall, Gigamon, Google Cloud, Hewlett-Packard, Hitachi, HP, Huawei, IBM, Ixia, Juniper, Juniper SRX Firewall, LG-Ericsson, Mellanox, Microsoft Azure, Mikrotik, MRV, NEC, Netgear, Nortel, Palo Alto, PfSense, Proxim Wireless, Quanta Computer, RAD, Riverbed, Solara Networks, Solara DeepSee, Sonicwall, VMWare, ZTE, ZyXEL, +++

Features overview
NetFlow Auditor constantly keeps its eyes on your Network and provides total visibility to quickly identify and alert on who is doing what, where, when, with whom and for how long. It learns network behaviors and detects and alerts on anomalies.
Free 30-Day Trial
Price Quote

Get a Quotation

Price Quote
Contact Us

Contact us

Book Demo
NetflowAuditor - by IdeaData © 2021
  Features|About|Contact|Terms|Privacy|KnowledgeBase|Recent Blogs