• Active Directory
  • Application
  • Desktop & Mobile
  • Help Desk
  • Network
  • Server
  • IT Security
  • MSP
  • On-Demand
 
 
Device Management, made easy
Manage control and secure your workstations, mobile
devices and tablets
 
 
Help Desk for Everyone
IT Help Desk Software and Customer Support Software
 
 
Protect Your IT. Save Your Business
Build a secure fortress with our security management solutions
 
 
MSP
Manage services faster, with multi-tenanted, ITIL-ready, and unified RMM solutions
 
 
On-Demand Solutions
IT Help Desk, Active Directory, and Operations Management from the Cloud
 

ASAM

Network Security Views

Advanced security analytics module

Network security snapshot
Security Snapshot

"Security snapshot" gives you details of the problems classified under classes for the time period selected by the user. Users can select the time period for which they need to see the security events. Every class has a pie chart and Time distribution graph, making it easier to understand the contribution of each problem in that class. The Time distribution graph shows a line graph with respect to time and number of events. You can click and drag the mouse pointer on the graph to zoom in / select a particular time on the graph to see time-specific reports of the problems.

Network security event list
Event List

Event list gives a list of all the events along with details, such as problem name, offenders IP(s), target IP(s), router name, severity, time of the attack. From this view, you can ignore certain events by giving criteria. You can also discard trusted flows to be harmless and that will not be taken into account.

network security event details
Event Details

Event details gives a thorough detail about the problem. The details include network, port, protocol, TCP flag and much more. Clicking on the router name gives details with mapped destination- source IP and the application, port, protocol etc. used. This report can be exported as a pdf or can be mailed with just a single click.

problem taxonomy
Problem Taxonomy

Gives you the list of all the classes and the respective problems.

Related Page: Introduction to Advanced security analytics.

Download 30-day free trial | Request Demo

Customers

Partners