MantisNet PPE software is highly scalable, performant and optimized for today's networks. The PPE continuously monitors, interrogates, decodes, extracts and converts unstructured network data into high resolution metadata (open-standard, key value pairs) for improved situational awareness and real-time access to actionable intelligence.
Apply the value of extracted and structured network protocol metadata for many uses in cybersecurity and network monitoring needs:
- Application and Network Performance Monitoring (APM and NPM)
- Continuous Monitoring, traffic analysis, classification and event correlation
- Data plane engineering
- De-encapsulation / Re-encapsulation of packets
- Detect command & control (C2) servers, rogue/hijacked servers, DDoS and MITM attacks
- Detect unauthorized access (ATO), and surreptitious file transfers (DLP)
- GRC compliance monitoring
- Next Generation Firewalls (NGF)
- Network Detection and Response (NDR)
- Network Monitoring and Lawful Intercept
- Network Security Monitoring
- Network Telemetry Generation
- Network Traffic Analysis (NTA)
- Policy Control & Charging (PCC)
- Quality of Experience (QoE)
- Security Analytics
- Security and Anomaly Detection
- Security Incident and Event Monitoring (SIEM)
- Threat Hunting
- Understand the cryptographic health of systems
- User and Entity Behavioral Analytics (UEBA)
The MantisNet Difference
- Intelligent - continuously transforms unstructured network data to structured metadata by extracting, key value-pairs, providing detailed real-time visibility into the network traffic
- Dynamic - parse any protocol or any payload type (L2 - L7) and use regular expression (regex) to identify and isolate traffic of interest
- Scalable - P4 software running in-memory is capable of processing network traffic at wire-speed, regardless of the network speed
- Efficient - produces serialized metadata (filtered/un-filtered) in JSON or any other data formats for use by follow-on stream processing, analytics and network monitoring or management systems. Specifically processes the traffic of interest - significantly reducing the amount of data needed to be transported, analyzed, stored or processed
- Actionable - in addition to increased visibility use the interactive remediation capabilities and take action on the in-transit network traffic to process/filter, shunt or terminate in real time
- Flexible -deploy anywhere visibility and analysis are needed using on-premise appliances or in cloud/virtualized environments using Docker, Kubernetes or other container technologies