Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Facilitates detailed examination of service performance issues on a per-session and per-OTT service basis, targeting platforms like Facebook, YouTube, and WhatsApp, while also providing insights into the availability and utilization of network features. It offers comprehensive IP layer decoding and session analytics, allowing for the development of customized KPIs. This tool plays a crucial role in verifying the functionality of indoor networks and their integration with macro networks. Furthermore, it geo-references radio frequency measurements and events, enabling a visual representation of the venue's layout. KPI reports are generated to assess the preparedness of in-building networks ahead of their launch. Leading manufacturers of chipsets and handsets utilize Actix Analyzer to benchmark the performance of new devices against established reference devices. Additionally, it streamlines the process of generating intricate KPI reports and facilitates in-depth investigations into performance challenges, thereby enhancing operational efficiency. This multifaceted approach ensures that service providers can maintain high-quality user experiences across various platforms.

Description

To effectively identify sophisticated threats, it is essential to conduct thorough inspection, extraction, and real-time analysis of all types of content traversing the network. Fidelis' network detection and response technology systematically scans all ports and protocols in both directions, gathering extensive metadata that serves as the foundation for robust machine-learning analytics. By utilizing sensors for direct, internal, email, web, and cloud communications, you achieve comprehensive network visibility and coverage. The tactics, techniques, and procedures (TTPs) of identified attackers are aligned with the MITRE ATT&CK™ framework, enabling security teams to proactively address potential threats. While threats may attempt to evade detection, they ultimately cannot escape. You can automatically profile and categorize IT assets and services, including enterprise IoT devices, legacy systems, and shadow IT, to create a detailed map of your cyber landscape. Furthermore, when combined with Fidelis' endpoint detection and response offering, you obtain a software asset inventory linked to known vulnerabilities, such as CVE and KB references, along with an assessment of security hygiene concerning patches and the status of endpoints. This comprehensive approach equips organizations with the tools needed to maintain a resilient cybersecurity posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Casbin
Fidelis Endpoint
Fidelis LRM
Google Digital Risk Protection
Intellicta
ThreatConnect Risk Quantifier (RQ)

Integrations

Casbin
Fidelis Endpoint
Fidelis LRM
Google Digital Risk Protection
Intellicta
ThreatConnect Risk Quantifier (RQ)

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Actix

Country

United Kingom

Website

actix.com/analyzer/

Vendor Details

Company Name

Fidelis Security

Founded

2002

Country

United States

Website

fidelissecurity.com/products/network/

Product Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Product Features

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Alternatives

CySight Reviews

CySight

IdeaData
IronDefense Reviews

IronDefense

IronNet Cybersecurity
Riverbed NetProfiler Reviews

Riverbed NetProfiler

Riverbed Technology
GREYCORTEX Mendel Reviews

GREYCORTEX Mendel

GREYCORTEX
Sangfor Athena NDR Reviews

Sangfor Athena NDR

Sangfor Technologies