SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
NetWitness
Decoder
         How do you know what really happened on your network if you don’t have a             Page | 1
         record of it?
         Can you prove definitively what communications did or did not occur on your
         network?
         Do you want to have a higher level of assurance regarding actual specific activities
         on your network?
NetWitness® Decoder is the cornerstone of the NetWitness NextGen™ infrastructure and the key component
of an enterprise-wide network data recording solution. Decoder is a real-
time, distributed, highly configurable network recording appliance that
enables users to collect, filter, and analyze full network traffic in an infinite
number of dimensions.

Unlike every other network recording or monitoring products on the market,
Decoder fully reassembles and globally normalizes traffic at every layer for
full session analysis. The patented Decoder represents a breakthrough in
network traffic monitoring that dynamically builds a complete taxonomy of
data across all layers and applications, including full packets. Decoder creates a definitive foundation of Total
Network Knowledge™ that can be mined in real-time by the NetWitness® Investigator Enterprise and
Informer applications. NetWitness Decoder now also includes NetWitness® Live, which provides you with
access to multi-source threat intelligence. For more advanced applications, users can leverage NextGen’s
available API/SDK to build more organizational-specific applications which utilize Decoder and the NextGen
infrastructure. Decoder represents the intersection of network metrics, rich application flow and content
information that differentiates NetWitness® products from any other capabilities on the market.


Now Available in a Portable Version!
NetWitness has now introduced NetWitness® NextGen Eagle, a portable and
compact version of the NetWitness® Decoder. NextGen Eagle broadens
NetWitness’ capabilities from fixed network infrastructure devices to include a
compact, mobile monitoring system to support law enforcement, incident
responders, auditors, intelligence, and consulting staff for field-duty scenarios.
Unlike other portable vendor offerings, NextGen Eagle also supports WiFi
monitoring with an exceptional depth of analysis.

Product Features:
        Supports 10G infrastructures
        Supports NetWitness® Live
        Linux-based, highly configurable, full packet capture and reassembly device
        Modular and fully upgradeable hardware platform across entire product line
        Indefinitely scales your collection infrastructure upon a distributed, highly manageable, real-time
         framework

                                                                 TM
                                              SecureGRC
   FlexParse™ enabled for rapid, user definable parsing and modelling
       Supports threat intelligence feeds that track BOTs, designer malware, darknets, proxies and fast flux
        networks, etc.
       Protocol and application exploitation: HTTP, FTP, TFTP, TELNET, SMTP, POP3, NNTP, DNS, HTTPS, SSL,
        SOCKS, SSH, Vcard, PGP, SMIME, DHCP, NETBIOS, SMB/CIFS, SNMP, NFS, RIP, MSRPC, Lotus Notes®,
        TDS(MSSQL), TNS(Oracle®), IRC, Lotus Sametime®, MSN IM, RTP, Gnutella, Yahoo Messenger, AIM,       Page | 2
        SIP, H.323, Net2Phone®,Yahoo Chat, SCCP (Cisco® Skinny), BitTorrent, GTALK, Hotmail, Yahoo Mail,
        GMail, TOR, Social Networking, Fast Flux and many others.
       Expandable SAS storage capacity & supports SAN solutions
       Available API/SDK for custom application development
       Supports NetWitness Identity for correlating users to network traffic
       Supports RSA SecurID and LDAP authentication

Deployment:
Place NetWitness® Decoder(s) wherever you want to capture traffic: egress, core, facility, or segment. They
can be operated continuously or tactically and ingest any network capture feed from any source. Decoders
are designed to interoperate with Investigator Enterprise and Informer, as well as push data to central
NetWitness® Concentrators for aggregated analytical views.
NetWitness® Appliance Models:

                                                                      Form
SKU                       Interface                Storage                          Power          Weight
                                                                      Factor

NWA 100-8D                One copper Ethernet      2TB Total Storage 1 RU        Single            25 lbs
                          100/1000 for             Not redundant     x 14" (D) 260 (W)
                          management                                 x 1.75" (H) 120/240V
                          One copper 100/1000                        x 16.8"
                          Ethernet capture                           (W)
                          interface

NWA 1200-16D              Four 100/1000            12TB Total         2 RU          Dual Redundant 66lbs
                          Ethernet                 Storage            x 27.75"      850 (W)
                          copper capture           Redundant with     (D)           120/240V auto
                          interfaces,              hotswap            x 3.44" (H)   switch
                          Or two 1000 Ethernet                        x 17.6"
                          fiber interfaces,                           (W)
                          Or two 10G XFP
                          interfaces

NWP 50-16D                One copper Ethernet 3TB Total Storage       Briefcase Single             16 lbs
                          100/1000 for           Redundant            x 5.75" (D) 520 (W)
                          management                                  x 11.5" (H) 120/240V
                          One copper Ethernet                         x 16.8"
                          100/1000 for capture                        (W)
                          One WiFi interface for
                          capture


                                                              TM
                                            SecureGRC
*All appliances are UL, FCC, CE and VCCI approved & RoHS Compliant

Concentrator and Broker
        As an enterprise, can you track malicious and anomalous activity and trends across all network
         assets?
                                                                                                                   Page | 3
        Are there relationships between unexplained network activities across your organization?
How can you build global reports regarding the effectiveness of your security controls?
NetWitness® Concentrator and Broker are high performance Linux-based network appliances that extend the
reach of NetWitness NextGen™ across your entire enterprise, and
facilitate real-time and historical reporting and alerting. For the first
time, comprehensive network and application layer detail can be
aggregated and analyzed across multiple capture locations and made
available to NextGen’s analytic applications, Informer and Investigator.
NetWitness Concentrators aggregate clusters of NetWitness® Decoders
in real-time, and NetWitness Broker provides a real-time, single,
hierarchical enterprise view across your entire network. NetWitness®
Live, fully integrated in the NetWitness infrastructure, provides users full
content analysis of network threat intelligence from multiple, globally-distributed threat intelligence sources.

NetWitness Concentrator is designed to aggregate data
hierarchically for ultimate scalability and deployment
flexibility across various organization-specific network
topologies and infrastructures. As a result,
Concentrators can be tiered in deployments to give
visibility into multiple capture locations.

NetWitness Broker also is designed to operate
hierarchically; however, its function is to broker
queries across an entire enterprise deployment. Broker
provides a single point of access to NextGen data and is
designed to operate and scale in any network
environment, independent of network latency,
throughput, or data volume.
Concentrator and Broker are fully compatible with all NetWitness analytical products. For more advanced
applications, users can leverage NextGen’s available API/SDK to build organizational-specific applications
which utilize the NetWitness NextGen™ infrastructure.

Product Features:
        Supports 10G infrastructures
        Supports NetWitness® Live
        64-bit Linux-based, modular and fully upgradeable hardware platform across the entire product line
        Easily aggregate multiple NetWitness® Decoder collection systems
        Deploy a single enterprise analysis point with Broker
        Manage and configure appliances from a single point


                                                                 TM
                                             SecureGRC
     Indefinitely scale your collection infrastructure upon distributed, highly manageable, real-time
          framework
         Expandable SAS storage capacity & supports SAN solutions
         Available API/SDK for custom application development
         Supports RSA SecurID and LDAP authentication
                                                                                                                 Page | 4
NetWitness® Appliance Models:
Product         SKU                              Interface      Storage        Rack Unit         Power       Weight

Broker          NWA 100-8b                       Two copper 2TB Total          1 U x 16.8" (W)   260 W,      25 lbs
                                                 Ethernet   Storage.           x 14" (D)         stand alone
                                                 100/1000   Redundant          x 1.75" (H)       120/240V
                                                                                                 auto switch

Concentrator NWA 400-16c                         Two copper 4TB Total          1 U x 17.2" (D)   560 W,      38lbs
                                                 Ethernet   Storage.           x 25.6" (H)       stand alone
                                                 100/1000   Not                x 1.7" (W)        120/240V
                                                            Redundant                            auto switch

Concentrator NWA 1200-32c *                      Two copper     12TB Total    2 U x 17.6" (D)    850 W,      66lbs
                                                 Ethernet       Storage.      x 27.75" (H)       Dual
                                                 100/1000       Redundant     x 3.44" (W)        Redundant
                                                 Or two fiber   with hotswap.                    120/240V
                                                 Ethernet                                        auto switch
                                                 1000

All appliances are UL, FCC, and CE approved & RoHS Compliant.
*Also VCCI approved.

Informer
         Is your network communicating with Botnets?
         Is sensitive data leaking from your network?
         Does your organization have insiders whose activities are illegal or competitive?
         Are you monitoring operational regulatory compliance?




                                                                 TM
                                              SecureGRC
Page | 5




NetWitness® Informer is the enterprise reporting, live charting and alerting application of the NetWitness
NextGen™ product suite. Informer leverages the power and Total Network Knowledge inherent in the
NextGen data capture and session reconstruction infrastructure, and the analytics of NetWitness Investigator
Enterprise to provide detailed reporting, charting and alerting on network performance, insider threats, data
leakage, compliance monitoring, I/T asset misuse, hacker activities, and a host of other threats.

NetWitness® Informer is a revolutionary new approach to network reporting and alerting. Informer goes
beyond traditional network reporting and alerting products on the market because it does not simply rely
upon log files, netflow, or other limited data sets to generate reports. Informer uses the comprehensive
network traffic that is captured and reconstructed by the NextGen infrastructure to provide a real-time
glimpse into incidents, threats, anomalies, misconfigurations, compliance violations, and other malicious or
benign activities on your network. Informer is a fully interactive, intuitive web-based report engine with
design features that enable users of any level to create the perfect report without sophisticated programming
or outside help. In addition, every report result is backed up with hard evidence, with one click into
NetWitness Investigator Enterprise. And by integrating NetWitness Investigator Enterprise with NetWitness®
Live, you also have access to multi-source threat intelligence.

Every network reporting product on the market today uses log files or complex network layer or flow
information as its data source. Not only does NetWitness® Informer provide the type of insight provides by
these products, but it also goes above and beyond to allow access to unprecedented details into network
applications and application layer content. This efficiency allows users to replace dozens of reports from
existing technologies, with a single Informer report. And it is this intersection of network metrics, rich
application flow and content information that differentiates NetWitness® NextGen from any other capability
on the market.

Deployment:
Connect NetWitness® Informer to any NetWitness® Decoder or NetWitness® Concentrator for reporting
against that infrastructure



                                                              TM
                                            SecureGRC
Product Features:
       Supports NetWitness® Live
       Hundreds of predefined report rules, categories and templates
       Flexible, WYSIWYG drag-and-drop report builder & scheduling engine
       Fully customizable, XML-based rules and report library for infinite report and alert combinations       Page | 6
       Live-charting for real-time dashboard of activity
       Full role-based access controls
       HTML and PDF report formats included
       Supports CEF, SNMP, SysLog, SMTP data push
       Offered as Windows® server software –or- integrated appliance for total flexibility

Report Examples:
       Security - profile and alert on zero-day, Botnet, DYN, DNS and intrusion activity with complete
        content
       Compliance - audit network-based components of policies and regulations such as FISMA, HIPPA, ISO
        1779, SOXGLB, and PCI standards
       IT Operations - report and chart across application and network layer metrics
       Business Intelligence - profile sensitive data flow in real-time with total access to all events and
        content surrounding suspect activity
       Insider Threat - monitor and profile computer, user, and resource activity across every application
        and device
       Legal – support e-Discovery, criminal investigations, or liability audits through network entity
        profiling and analysis

Screenshots:
NetWitness Informer features a fully customizable graphical user interface. Alerts can be viewed in real-time
and multiple alerts and charts can be tiled into a customized view. Download NetWitness Investigator Free!
Read More»

Minimum system requirements:
NetWitness recommends the following minimum hardware requirements for NetWitness Informer software.
       Windows® 2003 Server or Vista
       Microsoft IIS 5.0+
       2GB RAM
       1 Ethernet Port
       Internet Explorer v7 (also supports Firefox, Chrome and Safari browsers )
       .NET 2.0 with AJAX.NET Extensions




                                                                TM
                                             SecureGRC
NetWitness® Informer Appliance:
SKU                        Interface                Storage              Rack Unit       Power       Weight

NWA 100-4i                 Two copper Ethernet      2TB Total Storage.   1 RU            Single   25 lbs
                           100/1000                 Redundant            x 16.98" (W)    260 W,
                                                                         x 14" (D)       120/240V
                                                                                                                Page | 7
                                                                         x 1.75" (H)

*All appliances are UL, FCC, CE and VCCI approved & RoHS Compliant

Investigator
       How do you resolve alerts from your IDS or SIM that you do not understand?
       Can you quickly understand the scope and impact of malicious activity on your network?
       How can you investigate who is leaking information to your competitors or the press?
NetWitness® Investigator is the award-winning interactive threat analysis application of the NetWitness
NextGen product suite. Investigator provides security operations staff, auditors, and fraud and forensics
investigators the power to perform unprecedented free-form contextual analysis of raw network data
captured and reconstructed by the NetWitness NextGen infrastructure. Developed originally for the U.S.
Intelligence Community, and now used extensively by Law Enforcement, Defense, and other public and
private organizations, Investigator is based upon 10 years of development and deployment in some of the
most demanding and complex threat environments.




                                                                                                        With
its groundbreaking user interface and unprecedented analytics, Investigator lets you see your network traffic
in a new way. Unlike packet analysis products which display network traffic in the context of confusing
network nomenclature, Investigator uses a lexicon of nouns, verbs and adjectives – characteristics of the
actual application and logic layer protocols parsed by NextGen during session reconstruction.

                                                              TM
                                            SecureGRC
Both novice and expert users can use Investigator to pivot terabytes of network traffic easily to dive deeply
into the context and content of network sessions in real-time -- making threat analysis that once took days,
take only minutes. It is this intersection of network metrics, rich application flow, and content information
that differentiates NetWitness® products from any other capability on the market today.
In addition to the rich data Investigator receives from the NextGen infrastructure of NetWitness Decoders
and Concentrators, Investigator Enterprise can locally capture live traffic and process packet files from            Page | 8
virtually any existing network collection device for quick and easy analysis. And by integrating NetWitness
Investigator Enterprise with NetWitness® Live, you also have access to multi-source threat intelligence.

Product Features:
        Supports NetWitness® Live
        SSL Decryption (with server certificate)
        Interactive time charts, and summary view
        Interactive packet view and decode
        Hash Pcap on Export
        Enhanced content views
         o   Real-time, Patented Layer 7 Analytics
         o   Effectively analyze data starting from application layer entities like users, email, address, files ,
             and actions.
         o   Infinite, free-form analysis paths
         o   Content starting points
         o   Patented port agnostic service identification
        Extensive network and application layer filtering (e.g. MAC, IP, User, Keywords, Etc.)
        IPv6 support
        Captures live from any wired or wireless interface
        Full content search, with Regex support
        Exports data in .pcap format
        Imports packets from any open-source, home-grown and commercial packet capture system(e.g.
         .pcap file import)
        Bookmarking & History Tracking
        Integrated GeoIP for resolving IP addresses to city/county, supporting Google Earth visualization
        Customizable right-click functionality
        Supports WLAN 802.11 Microsoft, Linux and Mac OS radio devices as well as various header formats
         including CACE’s per packet information
        Supports RSA SecurID and LDAP authentication




                                                                 TM
                                              SecureGRC
Choose your Edition:
No matter what your IT problem, existing infrastructure, or technology preference—there's an edition of
NetWitness® Investigator that's right for you. Use the descriptions below to help you choose your edition.

Investigator
With Investigator you are provided with a full featured, stand-alone product capable of local live capture and     Page | 9
local packet file importing. Ideal for tactical and point analysis of network traffic. Supports 25 simultaneous
1GB captures - far exceeding data manipulation capabilities of packet tools like Wireshark

Investigator Enterprise
Licensed to customers with a NetWitness NextGen™ infrastructure, Investigator Enterprise is ideal for
enterprise users that require remote analytical access to NetWitness NextGen™ Linux-based appliances.

Deployment:
NetWitness Investigator is licensed per computer host, and can be used to locally process packet files, collect
live from a network tap or span port with insight into network traffic of your choice. In addition, Investigator
is fully integrated with all NetWitness NextGen™ products.

Screenshots:
NetWitness Investigator’s industry leading interactive user interface provides the threat analyst the ability to
drill into multiple dimensions of terabytes captured traffic across all network layers. View complete
information about any network sessions by drilling into fully reconstructed content and visualize your
network traffic geographically via Google Earth.

Minimum system requirements:
NetWitness recommends the following minimum hardware requirements for NetWitness Investigator:
        Windows® 2003 Server or Vista 32-bit
        Single 2Ghz Intel-based processor (Dual-core recommended)
        1GB RAM (2GB Recommended)
        1 Ethernet Port
        Internet Explorer v7+ (IE v6 may limit some functionality)
        Ample data storage to process and collect
To buy NetWitness or to find out how to integrate NextGen with enterprise SecureGRC TM integrated IT-GRC
and security framework click here




                                                                TM
                                              SecureGRC

Contenu connexe

En vedette

Main Task evaluation
Main Task evaluationMain Task evaluation
Main Task evaluationnanzbx
 
On Call Process (PDF)
On Call Process (PDF)On Call Process (PDF)
On Call Process (PDF)JOE RUSSO
 
Café coffee day
Café coffee dayCafé coffee day
Café coffee dayWordBox
 
Applying data visualisation to the analytics process
Applying data visualisation to the analytics processApplying data visualisation to the analytics process
Applying data visualisation to the analytics processCasper Blicher Olsen
 
Baromètre Webanalyse et Tag Management 2016
Baromètre Webanalyse et Tag Management 2016Baromètre Webanalyse et Tag Management 2016
Baromètre Webanalyse et Tag Management 2016Converteo
 

En vedette (6)

Main Task evaluation
Main Task evaluationMain Task evaluation
Main Task evaluation
 
Arboretto
ArborettoArboretto
Arboretto
 
On Call Process (PDF)
On Call Process (PDF)On Call Process (PDF)
On Call Process (PDF)
 
Café coffee day
Café coffee dayCafé coffee day
Café coffee day
 
Applying data visualisation to the analytics process
Applying data visualisation to the analytics processApplying data visualisation to the analytics process
Applying data visualisation to the analytics process
 
Baromètre Webanalyse et Tag Management 2016
Baromètre Webanalyse et Tag Management 2016Baromètre Webanalyse et Tag Management 2016
Baromètre Webanalyse et Tag Management 2016
 

Plus de Aegify Inc.

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Aegify Inc.
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013Aegify Inc.
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedAegify Inc.
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityAegify Inc.
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the CloudAegify Inc.
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non complianceAegify Inc.
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAegify Inc.
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security SolutionsAegify Inc.
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHAegify Inc.
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryAegify Inc.
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsAegify Inc.
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaasAegify Inc.
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness DecoderAegify Inc.
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCAegify Inc.
 

Plus de Aegify Inc. (15)

Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines Importance of Following HITECH Compliance Guidelines
Importance of Following HITECH Compliance Guidelines
 
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
eGestalt Technologies Named Winner of 2013 TiE50 “Top Startup” at TiEcon 2013
 
Webinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus DemystifiedWebinar on HIPAA Omnibus Demystified
Webinar on HIPAA Omnibus Demystified
 
eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Dernier

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Dernier (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

NetWitness Decoder

  • 1. NetWitness Decoder How do you know what really happened on your network if you don’t have a Page | 1 record of it? Can you prove definitively what communications did or did not occur on your network? Do you want to have a higher level of assurance regarding actual specific activities on your network? NetWitness® Decoder is the cornerstone of the NetWitness NextGen™ infrastructure and the key component of an enterprise-wide network data recording solution. Decoder is a real- time, distributed, highly configurable network recording appliance that enables users to collect, filter, and analyze full network traffic in an infinite number of dimensions. Unlike every other network recording or monitoring products on the market, Decoder fully reassembles and globally normalizes traffic at every layer for full session analysis. The patented Decoder represents a breakthrough in network traffic monitoring that dynamically builds a complete taxonomy of data across all layers and applications, including full packets. Decoder creates a definitive foundation of Total Network Knowledge™ that can be mined in real-time by the NetWitness® Investigator Enterprise and Informer applications. NetWitness Decoder now also includes NetWitness® Live, which provides you with access to multi-source threat intelligence. For more advanced applications, users can leverage NextGen’s available API/SDK to build more organizational-specific applications which utilize Decoder and the NextGen infrastructure. Decoder represents the intersection of network metrics, rich application flow and content information that differentiates NetWitness® products from any other capabilities on the market. Now Available in a Portable Version! NetWitness has now introduced NetWitness® NextGen Eagle, a portable and compact version of the NetWitness® Decoder. NextGen Eagle broadens NetWitness’ capabilities from fixed network infrastructure devices to include a compact, mobile monitoring system to support law enforcement, incident responders, auditors, intelligence, and consulting staff for field-duty scenarios. Unlike other portable vendor offerings, NextGen Eagle also supports WiFi monitoring with an exceptional depth of analysis. Product Features:  Supports 10G infrastructures  Supports NetWitness® Live  Linux-based, highly configurable, full packet capture and reassembly device  Modular and fully upgradeable hardware platform across entire product line  Indefinitely scales your collection infrastructure upon a distributed, highly manageable, real-time framework TM SecureGRC
  • 2. FlexParse™ enabled for rapid, user definable parsing and modelling  Supports threat intelligence feeds that track BOTs, designer malware, darknets, proxies and fast flux networks, etc.  Protocol and application exploitation: HTTP, FTP, TFTP, TELNET, SMTP, POP3, NNTP, DNS, HTTPS, SSL, SOCKS, SSH, Vcard, PGP, SMIME, DHCP, NETBIOS, SMB/CIFS, SNMP, NFS, RIP, MSRPC, Lotus Notes®, TDS(MSSQL), TNS(Oracle®), IRC, Lotus Sametime®, MSN IM, RTP, Gnutella, Yahoo Messenger, AIM, Page | 2 SIP, H.323, Net2Phone®,Yahoo Chat, SCCP (Cisco® Skinny), BitTorrent, GTALK, Hotmail, Yahoo Mail, GMail, TOR, Social Networking, Fast Flux and many others.  Expandable SAS storage capacity & supports SAN solutions  Available API/SDK for custom application development  Supports NetWitness Identity for correlating users to network traffic  Supports RSA SecurID and LDAP authentication Deployment: Place NetWitness® Decoder(s) wherever you want to capture traffic: egress, core, facility, or segment. They can be operated continuously or tactically and ingest any network capture feed from any source. Decoders are designed to interoperate with Investigator Enterprise and Informer, as well as push data to central NetWitness® Concentrators for aggregated analytical views. NetWitness® Appliance Models: Form SKU Interface Storage Power Weight Factor NWA 100-8D One copper Ethernet 2TB Total Storage 1 RU Single 25 lbs 100/1000 for Not redundant x 14" (D) 260 (W) management x 1.75" (H) 120/240V One copper 100/1000 x 16.8" Ethernet capture (W) interface NWA 1200-16D Four 100/1000 12TB Total 2 RU Dual Redundant 66lbs Ethernet Storage x 27.75" 850 (W) copper capture Redundant with (D) 120/240V auto interfaces, hotswap x 3.44" (H) switch Or two 1000 Ethernet x 17.6" fiber interfaces, (W) Or two 10G XFP interfaces NWP 50-16D One copper Ethernet 3TB Total Storage Briefcase Single 16 lbs 100/1000 for Redundant x 5.75" (D) 520 (W) management x 11.5" (H) 120/240V One copper Ethernet x 16.8" 100/1000 for capture (W) One WiFi interface for capture TM SecureGRC
  • 3. *All appliances are UL, FCC, CE and VCCI approved & RoHS Compliant Concentrator and Broker  As an enterprise, can you track malicious and anomalous activity and trends across all network assets? Page | 3  Are there relationships between unexplained network activities across your organization? How can you build global reports regarding the effectiveness of your security controls? NetWitness® Concentrator and Broker are high performance Linux-based network appliances that extend the reach of NetWitness NextGen™ across your entire enterprise, and facilitate real-time and historical reporting and alerting. For the first time, comprehensive network and application layer detail can be aggregated and analyzed across multiple capture locations and made available to NextGen’s analytic applications, Informer and Investigator. NetWitness Concentrators aggregate clusters of NetWitness® Decoders in real-time, and NetWitness Broker provides a real-time, single, hierarchical enterprise view across your entire network. NetWitness® Live, fully integrated in the NetWitness infrastructure, provides users full content analysis of network threat intelligence from multiple, globally-distributed threat intelligence sources. NetWitness Concentrator is designed to aggregate data hierarchically for ultimate scalability and deployment flexibility across various organization-specific network topologies and infrastructures. As a result, Concentrators can be tiered in deployments to give visibility into multiple capture locations. NetWitness Broker also is designed to operate hierarchically; however, its function is to broker queries across an entire enterprise deployment. Broker provides a single point of access to NextGen data and is designed to operate and scale in any network environment, independent of network latency, throughput, or data volume. Concentrator and Broker are fully compatible with all NetWitness analytical products. For more advanced applications, users can leverage NextGen’s available API/SDK to build organizational-specific applications which utilize the NetWitness NextGen™ infrastructure. Product Features:  Supports 10G infrastructures  Supports NetWitness® Live  64-bit Linux-based, modular and fully upgradeable hardware platform across the entire product line  Easily aggregate multiple NetWitness® Decoder collection systems  Deploy a single enterprise analysis point with Broker  Manage and configure appliances from a single point TM SecureGRC
  • 4. Indefinitely scale your collection infrastructure upon distributed, highly manageable, real-time framework  Expandable SAS storage capacity & supports SAN solutions  Available API/SDK for custom application development  Supports RSA SecurID and LDAP authentication Page | 4 NetWitness® Appliance Models: Product SKU Interface Storage Rack Unit Power Weight Broker NWA 100-8b Two copper 2TB Total 1 U x 16.8" (W) 260 W, 25 lbs Ethernet Storage. x 14" (D) stand alone 100/1000 Redundant x 1.75" (H) 120/240V auto switch Concentrator NWA 400-16c Two copper 4TB Total 1 U x 17.2" (D) 560 W, 38lbs Ethernet Storage. x 25.6" (H) stand alone 100/1000 Not x 1.7" (W) 120/240V Redundant auto switch Concentrator NWA 1200-32c * Two copper 12TB Total 2 U x 17.6" (D) 850 W, 66lbs Ethernet Storage. x 27.75" (H) Dual 100/1000 Redundant x 3.44" (W) Redundant Or two fiber with hotswap. 120/240V Ethernet auto switch 1000 All appliances are UL, FCC, and CE approved & RoHS Compliant. *Also VCCI approved. Informer  Is your network communicating with Botnets?  Is sensitive data leaking from your network?  Does your organization have insiders whose activities are illegal or competitive?  Are you monitoring operational regulatory compliance? TM SecureGRC
  • 5. Page | 5 NetWitness® Informer is the enterprise reporting, live charting and alerting application of the NetWitness NextGen™ product suite. Informer leverages the power and Total Network Knowledge inherent in the NextGen data capture and session reconstruction infrastructure, and the analytics of NetWitness Investigator Enterprise to provide detailed reporting, charting and alerting on network performance, insider threats, data leakage, compliance monitoring, I/T asset misuse, hacker activities, and a host of other threats. NetWitness® Informer is a revolutionary new approach to network reporting and alerting. Informer goes beyond traditional network reporting and alerting products on the market because it does not simply rely upon log files, netflow, or other limited data sets to generate reports. Informer uses the comprehensive network traffic that is captured and reconstructed by the NextGen infrastructure to provide a real-time glimpse into incidents, threats, anomalies, misconfigurations, compliance violations, and other malicious or benign activities on your network. Informer is a fully interactive, intuitive web-based report engine with design features that enable users of any level to create the perfect report without sophisticated programming or outside help. In addition, every report result is backed up with hard evidence, with one click into NetWitness Investigator Enterprise. And by integrating NetWitness Investigator Enterprise with NetWitness® Live, you also have access to multi-source threat intelligence. Every network reporting product on the market today uses log files or complex network layer or flow information as its data source. Not only does NetWitness® Informer provide the type of insight provides by these products, but it also goes above and beyond to allow access to unprecedented details into network applications and application layer content. This efficiency allows users to replace dozens of reports from existing technologies, with a single Informer report. And it is this intersection of network metrics, rich application flow and content information that differentiates NetWitness® NextGen from any other capability on the market. Deployment: Connect NetWitness® Informer to any NetWitness® Decoder or NetWitness® Concentrator for reporting against that infrastructure TM SecureGRC
  • 6. Product Features:  Supports NetWitness® Live  Hundreds of predefined report rules, categories and templates  Flexible, WYSIWYG drag-and-drop report builder & scheduling engine  Fully customizable, XML-based rules and report library for infinite report and alert combinations Page | 6  Live-charting for real-time dashboard of activity  Full role-based access controls  HTML and PDF report formats included  Supports CEF, SNMP, SysLog, SMTP data push  Offered as Windows® server software –or- integrated appliance for total flexibility Report Examples:  Security - profile and alert on zero-day, Botnet, DYN, DNS and intrusion activity with complete content  Compliance - audit network-based components of policies and regulations such as FISMA, HIPPA, ISO 1779, SOXGLB, and PCI standards  IT Operations - report and chart across application and network layer metrics  Business Intelligence - profile sensitive data flow in real-time with total access to all events and content surrounding suspect activity  Insider Threat - monitor and profile computer, user, and resource activity across every application and device  Legal – support e-Discovery, criminal investigations, or liability audits through network entity profiling and analysis Screenshots: NetWitness Informer features a fully customizable graphical user interface. Alerts can be viewed in real-time and multiple alerts and charts can be tiled into a customized view. Download NetWitness Investigator Free! Read More» Minimum system requirements: NetWitness recommends the following minimum hardware requirements for NetWitness Informer software.  Windows® 2003 Server or Vista  Microsoft IIS 5.0+  2GB RAM  1 Ethernet Port  Internet Explorer v7 (also supports Firefox, Chrome and Safari browsers )  .NET 2.0 with AJAX.NET Extensions TM SecureGRC
  • 7. NetWitness® Informer Appliance: SKU Interface Storage Rack Unit Power Weight NWA 100-4i Two copper Ethernet 2TB Total Storage. 1 RU Single 25 lbs 100/1000 Redundant x 16.98" (W) 260 W, x 14" (D) 120/240V Page | 7 x 1.75" (H) *All appliances are UL, FCC, CE and VCCI approved & RoHS Compliant Investigator  How do you resolve alerts from your IDS or SIM that you do not understand?  Can you quickly understand the scope and impact of malicious activity on your network?  How can you investigate who is leaking information to your competitors or the press? NetWitness® Investigator is the award-winning interactive threat analysis application of the NetWitness NextGen product suite. Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed by the NetWitness NextGen infrastructure. Developed originally for the U.S. Intelligence Community, and now used extensively by Law Enforcement, Defense, and other public and private organizations, Investigator is based upon 10 years of development and deployment in some of the most demanding and complex threat environments. With its groundbreaking user interface and unprecedented analytics, Investigator lets you see your network traffic in a new way. Unlike packet analysis products which display network traffic in the context of confusing network nomenclature, Investigator uses a lexicon of nouns, verbs and adjectives – characteristics of the actual application and logic layer protocols parsed by NextGen during session reconstruction. TM SecureGRC
  • 8. Both novice and expert users can use Investigator to pivot terabytes of network traffic easily to dive deeply into the context and content of network sessions in real-time -- making threat analysis that once took days, take only minutes. It is this intersection of network metrics, rich application flow, and content information that differentiates NetWitness® products from any other capability on the market today. In addition to the rich data Investigator receives from the NextGen infrastructure of NetWitness Decoders and Concentrators, Investigator Enterprise can locally capture live traffic and process packet files from Page | 8 virtually any existing network collection device for quick and easy analysis. And by integrating NetWitness Investigator Enterprise with NetWitness® Live, you also have access to multi-source threat intelligence. Product Features:  Supports NetWitness® Live  SSL Decryption (with server certificate)  Interactive time charts, and summary view  Interactive packet view and decode  Hash Pcap on Export  Enhanced content views o Real-time, Patented Layer 7 Analytics o Effectively analyze data starting from application layer entities like users, email, address, files , and actions. o Infinite, free-form analysis paths o Content starting points o Patented port agnostic service identification  Extensive network and application layer filtering (e.g. MAC, IP, User, Keywords, Etc.)  IPv6 support  Captures live from any wired or wireless interface  Full content search, with Regex support  Exports data in .pcap format  Imports packets from any open-source, home-grown and commercial packet capture system(e.g. .pcap file import)  Bookmarking & History Tracking  Integrated GeoIP for resolving IP addresses to city/county, supporting Google Earth visualization  Customizable right-click functionality  Supports WLAN 802.11 Microsoft, Linux and Mac OS radio devices as well as various header formats including CACE’s per packet information  Supports RSA SecurID and LDAP authentication TM SecureGRC
  • 9. Choose your Edition: No matter what your IT problem, existing infrastructure, or technology preference—there's an edition of NetWitness® Investigator that's right for you. Use the descriptions below to help you choose your edition. Investigator With Investigator you are provided with a full featured, stand-alone product capable of local live capture and Page | 9 local packet file importing. Ideal for tactical and point analysis of network traffic. Supports 25 simultaneous 1GB captures - far exceeding data manipulation capabilities of packet tools like Wireshark Investigator Enterprise Licensed to customers with a NetWitness NextGen™ infrastructure, Investigator Enterprise is ideal for enterprise users that require remote analytical access to NetWitness NextGen™ Linux-based appliances. Deployment: NetWitness Investigator is licensed per computer host, and can be used to locally process packet files, collect live from a network tap or span port with insight into network traffic of your choice. In addition, Investigator is fully integrated with all NetWitness NextGen™ products. Screenshots: NetWitness Investigator’s industry leading interactive user interface provides the threat analyst the ability to drill into multiple dimensions of terabytes captured traffic across all network layers. View complete information about any network sessions by drilling into fully reconstructed content and visualize your network traffic geographically via Google Earth. Minimum system requirements: NetWitness recommends the following minimum hardware requirements for NetWitness Investigator:  Windows® 2003 Server or Vista 32-bit  Single 2Ghz Intel-based processor (Dual-core recommended)  1GB RAM (2GB Recommended)  1 Ethernet Port  Internet Explorer v7+ (IE v6 may limit some functionality)  Ample data storage to process and collect To buy NetWitness or to find out how to integrate NextGen with enterprise SecureGRC TM integrated IT-GRC and security framework click here TM SecureGRC