{"id":4110,"date":"2019-07-10T10:59:20","date_gmt":"2019-07-10T09:59:20","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=4110"},"modified":"2019-07-10T10:59:22","modified_gmt":"2019-07-10T09:59:22","slug":"symantec-network-forensics-security-analytics","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/symantec-network-forensics-security-analytics\/","title":{"rendered":"Symantec Network Forensics &#038; Security Analytics"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_row _builder_version=&#8221;3.24&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_image src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/07\/nfsa-banner.png&#8221; _builder_version=&#8221;3.24&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\"textproofleft\">Comprehensive Network Traffic Analysis and Forensics to Expose the Source and Scope of Any Attack<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\"><\/div>\n<\/div>\n<\/div>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecOrange textproofleft\">Like a security camera or DVR for your network.<\/h4>\n<p>Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes. Security Analytics is an advanced network traffic analysis and forensic tool enabling you to:<a href=\"https:\/\/www.symantec.com\/content\/symantec\/english\/en\/products\/advanced-threat-protection\"><\/a><\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Thoroughly analyze all network traffic<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">See the full source and scope of cyber attacks and respond faster<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Arm incident response teams with clear, concise answers and forensic evidence<a href=\"https:\/\/www.symantec.com\/content\/symantec\/english\/en\/theme\/security-analytics-key-features.html#extractions-of-artifacts\"><\/a><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Use unrivaled data enrichment and cyber threat intelligence<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Add context to existing security tools<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Integrate with Symantec solutions to extend investigations across network, endpoint and email<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<div class=\"content-col content-band\">\n<div class=\"textproof parbase\">\n<div class=\"textproofclass\">\n<h3 class=\"textproofleft\">Know Your Security Risks at the Push of a Button<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<h3 class=\"textproofclass\"><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"media-col content-band\">\n<div class=\"textproof parbase\">\n<h3 class=\"textproofclass\"><\/h3>\n<\/div>\n<\/div>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecOrange textproofleft\">Get advanced network traffic analysis and forensics to see what&#8217;s happening on your network.<\/h4>\n<p>Simply deploy Security Analytics appliance or virtual appliance on your network and capture traffic. Let it run for a few days, then push a button and generate a comprehensive PDF report that covers full network traffic analysis and critical areas including:<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Predicted file count hidden in encrypted traffic<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">The amount of encrypted traffic crossing your network<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Risky applications on the network<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Anomalous network behavior based on a benchmark of your actual traffic<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">An executive summary to share with security team or management so you can prioritize activities<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">Go Beyond Manual Forensics and Packet Capture<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecOrange textproofleft\">Transform manual forensic data analysis into advanced network traffic analysis and automated incident response.<\/h4>\n<p>With a fully enriched &#8220;system of record,&#8221; your incident response teams will reduce time to resolution and answer the what, when, and how of any security incident. Find answers through comprehensive network traffic analysis and forensic evidence, including root-cause exploration, deep packet inspection, integrated reputation services and data enrichment, and advanced context-based reporting on malicious activity.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Enrich all traffic data with the latest cyber threat intelligence<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Rely on multiple reputation<span>\u00a0<\/span>sources<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Perform sophisticated<span>\u00a0anomaly detection<\/span><\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Scan SCADA<span>\u00a0<\/span>protocols<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Extract and broker only truly unknown files for sandbox<span>\u00a0<\/span>analysis to save resources<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">Threat Hunting: A Proactive Approach to Forensic Investigation and Cybersecurity<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecOrange textproofleft\">Why react when you can act?<\/h4>\n<p>With Symantec Security Analytics, your IT security team gets forensic tools and traffic analysis to proactively search for potential hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advanced threats before they can launch an attack.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Expose the source and scope of a developing attack with unrivalled data enrichment and threat intelligence<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Reduce time-to-resolution with sophisticated anomaly detection and advanced network forensics<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_margin=&#8221;|291px||auto||&#8221; _builder_version=&#8221;3.24&#8243; module_alignment=&#8221;center&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243;]<h3 class=\"textproofleft\">Uncover Security Threats Hiding in Encrypted Traffic<\/h3>\n[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;3.24&#8243;][et_pb_text _builder_version=&#8221;3.24&#8243; text_font=&#8221;||||||||&#8221; text_line_height=&#8221;1.2em&#8221;]<h4 class=\"symantecOrange textproofleft\">Gain total visibility into network traffic by deploying with Symantec SSL Visibility.<\/h4>\n<p>Use Symantec Security Analytics to enable meticulous network forensics and monitoring across all network traffic, thousands of applications, dozens of file transports, all flows, and all packets\u2014including encrypted traffic when deployed with Symantec SSL Visibility. Gain total forensic data analysis of your network traffic with actionable intelligence so you can quickly shut down exposure and mitigate ongoing risk.<\/p>\n<ul>\n<li><span class=\"symantecBlueBullet\">Conduct complete network traffic analysis, even on encrypted data<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">See detailed insights from all forensic captures<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Establish policies to selectively decrypt SSL traffic<\/span><\/li>\n<li><span class=\"symantecBlueBullet\">Share encrypted traffic insight with your security applications<\/span><\/li>\n<\/ul>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>Comprehensive Network Traffic Analysis and Forensics to Expose the Source and Scope of Any Attack Like a security camera or DVR for your network. Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4110","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Network Forensics &amp; Security Analytics | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Network Forensics &amp; Security Analytics | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-10T09:59:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/#local-place\"},\"address\":{\"@id\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/#webpage\",\"url\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/\",\"name\":\"Symantec Network Forensics & Security Analytics | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-07-10T09:59:20+00:00\",\"dateModified\":\"2019-07-10T09:59:22+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.cyberrange.be\/fr\/symantec-network-forensics-security-analytics\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=4110"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/4110\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=4110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}