Dynamite Agent and Raw Data Examples
The agent provides network and cybersecurity operators with network metadata to provide them with the ability to deep-dive into lower-level activities that pose threats to cloud networks.
Topics Covered in this Quick Video Demo
Dynamite-NSM presents powerful dashboards, giving comprehensive view into performance and threat-based metrics. This includes flow data, such as NetFlow, sFlow, IPFIX, so you capture data that meets the industry standard for gleaning insights from network traffic. Dynamite-NSM also includes flow processing, but goes deeper by adding a Zeek-based agent (aka Bro). Zeek monitors traffic and converts it into relevant metadata for high-level semantic analysis. This Zeek metadata contains comprehensive connection records as well as application-layer transcripts, e.g., HTTP sessions & URIs, key headers, MIME types & server responses; DNS requests & replies; SSL certificates; key content of SMTP sessions; and much more.
- In this quick overview demo video we will:
- Explain our Agent and what makes it unique
- Explain how we deploy the open sourced solution
- Explain and show you examples of the raw data you can collect
- Explain how you can interact with the raw data
Dynamite-NSM can be easily deployed in different environments including high-speed data centers, small-to-large enterprises, IoT & industrial networks, and even at home.