Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!

Nessar

Logo
Vi

Sản phẩm

Photon Sensor – 1G The Photon Sensor enables organizations to gain unprecedented visibility into network security events. By solving the “Goldilocks” problem, our sensors collect the right amount of data at the right time. Traditionally, organizations have suffered from the age-old garbage in / garbage out problem. This is because toolsets have either collected too […]

Stellar Cyber Photon Sensor – 1G

Photon Sensor – 1G

The Photon Sensor enables organizations to gain unprecedented visibility into network security events. By solving the “Goldilocks” problem, our sensors collect the right amount of data at the right time. Traditionally, organizations have suffered from the age-old garbage in / garbage out problem. This is because toolsets have either collected too much data, too little data or have lacked contextual information within the data, that would allow security analysts to gain better understanding of the data. To that end, Stellar Cyber invented Interflow ™ to get the data “just right” as Goldilocks so eloquently put it in the childhood fairy tale , Goldilocks & The Three Bears.

The Photon Sensor is a network sensor that can monitor 4 LAN segments at an aggregated throughput of 1 gigabit per second. Its small size is ideal for fast and easy deployment at remote offices, where server room or data center real estate is hard to obtain, and technical staff is limited or nonexistent. Its literally plug and play!

How it works

Simply connect one of the monitoring interfaces of the Pho- ton Sensor to the mirror port of a switch that you wish to monitor or place a network tap on the wire that you would like to monitor and connect the other end of the tap to the sensor. Once this is complete you can log into the CLI of the network sensor and perform a few configuration steps such as setting the management IP and configuring the sensor to talk to the central manager. The next step is to determine if you also want to collect server log data. If so, simply con- figure your syslog settings on the device you would like to collect logs from to send them to the IP address of the sensor on appropriate UDP port.

Packets and logs will now start to be captured, rich JSON metadata will be generated and transmitted over HTTP or HTPS to a data lake such as the Starlight Appliance, Elasticsearch or Splunk. Once this data is stored in your SIEM or Big Data platform, security analytics can then be performed on a complete dataset.