Photon Sensor – 10G
The Photon Sensor is a network sensor that can monitor 10 LAN segments at an aggregated throughput of 1 gigabit per second. Its small size is ideal for fast and easy deployment at remote offices, where server room or data center real estate is hard to obtain, and technical staff is limited or nonexistent. Its literally plug and play!
Photon Sensor – 10G The Photon Sensor enables organizations to gain unprecedented visibility into network security events. By solving the “Goldilocks” problem, our sensors collect the right amount of data at the right time. Traditionally, organizations have suffered from the age-old garbage in / garbage out problem. This is because tool sets have either collected too much data, too little data or have lacked contextual information within the data, that would allow security analysts to gain better understanding of the data. To that end, Stellar Cyber invented Interflow ™ to get the data “just right” as Goldilocks so eloquently put it in the childhood fairy tale , Goldilocks & The Three Bears
Interflow is a technology that was designed by Stellar Cyber engineers to capture network packets, files and server logs in an effort to output a dataset to other tools that is 100 times richer than Netflow (too little), 100 times smaller than PCAP (too big) and fused with context, (just right) such as geo location, IP reputation and user information. Unlike open source network sensors such as Bro / Zeek or its commercial equivalent Corelight, which are limited to 50 protocols, Photon Sensors can identify over thousands of protocols at line rate speeds and decode packet payload to form useful metadata in the form of JSON records called Interflow.
Packets, Files & Logs
Interflow doesn’t stop at network packet collection; it goes a step further and does what no other sensors in the market can do and that is combine its packet capture abilities with file and log capture. Photon Sensors extract files out of packet flows so that file transmission detail can be used to identify file theft or malware download. The sensor can also be used as a log aggregation and log forwarding tool to consolidate log collection and simplify log management.