HYYA

advertisement
The Most Analytical and Comprehensive
Defense Network in a Box
Unmatched Visibility
 Know who touched what, where and when
 Real time alerts to potential threats
 Full packet capture so you can review exactly what happened
 Be able to tell if an attack was successful and what files were stolen
 Know if malware was successful at infecting your machine
 Spot malicious activity early to reduce negative impact to business
 Visibility into how employees use/abuse your network resources
 Capture failed login attempts, unauthorized file sharing, etc.
Built With Dependable Global Solutions
 Snort
 Metasploit
 Saracata
 OpenVAS
 Bro IDS
 Over 300 Built In
 Sguil
 Snorby
 Sqert
 ELSA
 Nagios
 Wireshark
Security Tools
HYYA – Integrated Systems
An Entire Virtualized Defense Network
 CastleWalls & InnerWalls - Multiple Firewalls
 WatchTower – SIEM, IDS and More…
 WatchGuards – IDS, NSM and More…
 Assassin – Full Penetration Testing Platform
 Sensors – Watch Each Subnet For Problems
 Add-ons - Ability to Add More Customized Systems
Defense Network Design
HYYA – Capabilities With
Virtualization Platform
 KVM & Container Virtualization
 Central Management
 Reliable Backup/Restore
 High Availability
 Flexible Networking
 Flexible Storage
 And Much More…
Virtualizing an Entire Network in a Box…
Fully Customizable to Suit All Needs…
HYYA – Capabilities With
CastleWalls & InnerWalls
 Multiple Firewalls
 Network Tools
 Web Based GUI
 Graphs & Reporting
 Traffic Shaping
 Dynamic DNS
 Load Balancing
 Captive Portal
 VPN
 Proxy Server
 NAT
 And Much More…
HYYA – Capabilities With WatchTower
 SIEM
 IDS
 HIDS
 IPS
 Traffic Analysis
 NetFlow Analysis
 Anomaly Detection
 Attack Correlation
 Log Management/Analysis
 Asset Management &
Discovery
 OS Detection & OS change
Analysis
HYYA – Capabilities With WatchTower Cont’d.










Network Monitoring
Vulnerability Assessment
Many Unified Security Tools
Security Information Visualization
Compliance Resources
Risk Calculation
IP Reputation Monitoring
Supports Many Security Plugins
In Depth View of All Security Aspects
And Much More…
Easy to Use Graphical User Interface
HYYA – Capabilities With WatchGuards















Network Security Monitoring
Signature Based Intrusion Detection System
Full Context and Forensic Visibility
Traffic Monitoring & Analysis
Full Packet Capture Analysis
Bro IDS
Snort or Suricata Deployment
Squil Analyst Console
ELSA Log Management
Squert Web Interface
Snorby Web Interface
CapME Web Interface
Seamlessly Pivot Between Tools
Large Collection of Security Tools
See What Data Was Stolen Via Logs
HYYA – Capabilities With WatchGuards Cont’d.
 See How the Attacker Breached the Network
 See Failed Login Attempts
 Frame by Frame Evidence of Network Attack
 Network Efficiency Monitoring
 Logs Every Network Transaction For Evidence
 Ability to Pull Live Malware Out of the Logs
 Ability to Pull Stolen Files Out of the Logs
 See Where Attacks Are Coming From
 Know What Employees Are Doing On Your Network
 In Depth View of All Security Aspects
 And Much More…
HYYA – Capabilities With Assassin
 Easily Audit Networks For




Security Issues
Vulnerability Assessment
Platform
Penetrating Testing
Platform
Network Testing Platform
Over 300 Built In IT
Security Tools
HYYA - Capabilities
 IDS
 Virtualization
 HIDS
 Network Security Monitor
 SIEM
 Resource Monitoring
 Vulnerability Audits
 Web Based Management
 Multiple Firewalls
 Graphs & Reporting
 Network Antivirus
 Network Visibility
 Remote Access VPN
 Threat Management
 Full Packet Capture
 Security Intelligence
 Traffic Analysis
 And Much Much More…
Conclusion
 HYYA leverages many of the IT security industry’s best
kept secrets and most advanced systems to deliver
unmatched network visibility and defense.
 By using HYYA you can leverage auditing tools to spot
security issues before they lead to costly data breaches.
 With HYYA you know who touched what, where and
when.
 HYYA is the most cost effective solution to getting the
network visibility you need to defend networks in
today’s world.
Download