Dynamite Agent and Raw Data Examples 

The agent provides network and cybersecurity operators with network metadata to provide them with the  ability to deep-dive into lower-level activities that pose threats to cloud networks.

 

Topics Covered in this Quick Video Demo

Dynamite-NSM presents powerful dashboards, giving comprehensive view into performance and threat-based metrics. This includes flow data, such as NetFlow, sFlow, IPFIX, so you capture data that meets the industry standard for gleaning insights from network traffic. Dynamite-NSM also includes flow processing, but goes deeper by adding a Zeek-based agent (aka Bro). Zeek monitors traffic and converts it into relevant metadata for high-level semantic analysis. This Zeek metadata contains comprehensive connection records as well as application-layer transcripts, e.g., HTTP sessions & URIs, key headers, MIME types & server responses; DNS requests & replies; SSL certificates; key content of SMTP sessions; and much more.

  • In this quick overview demo video we will:
  • Explain our Agent and what makes it unique
  • Explain how we deploy the open sourced solution
  • Explain and show you examples of the raw data you can collect
  • Explain how you can interact with the raw data

Dynamite-NSM can be easily deployed in different environments including high-speed data centers, small-to-large enterprises, IoT & industrial networks, and even at home.