TEHTRIS NETWORK TRAFFIC ANALYSIS detects network intrusions with signatures and flow analysis. In addition, network forensics operations can be initiated by looking at metadata, such as Netflow. Finally, passive audits are performed on a continual basis to detect vulnerabilities.
TEHTRIS NTA is connected by the client to a mirroring port or TAP box where network flows can be analyzed. The TEHTRIS NTA VM can thus analyze the related flows in order to provide cybersurveillance services at the network layer.
The list of flows to be studied as well as the IP addresses to follow are shared with TEHTRIS to optimize the settings during the remote deployment.
Since its creation, TEHTRIS has taken into account the protection of all data processed in order to ensure the security of the information systems that it is entrusted to. This is not only from the time of development but also each time the TEHTRIS XDR Platform is improved. Security and privacy by design measures are used for each step of the data processing, from the collection of data in your infrastructure to its destruction on our Appliances.
TEHTRIS applies the same principles of security and privacy by design in each of its solutions in order to protect the integrity, confidentiality and authenticity of your data.