Developing a Network Traffic Analysis product
We have been developing and selling products that capture and analyze packets flowing through networks in the information and communication field. We are considering the development of products that take advantage of this in the security field.
This product detects in real time whether unauthorized communication is performed by matching captured packets and logs acquired from the security appliance with threat intelligence information. Captured packets can be saved as Pcap files, which can be used for multi-post analysis of security incidents and data for network forensics.
- • Provided in a portable specialized housing. Also available as a software product.
- • Combined use of threat intelligence from multiple vendors
- • Analyze using multiple data sources such as packets and logs
- • Generate localized reports
By providing these functions, we aim to provide products that can be used in various situations to investigate security incidents. Please contact us if you are interested.