Perception is a network analysis tool designed with the analyst in mind.

The focus for today’s cyber security teams has switched from protecting against what’s outside to discovering what’s inside.  Using Perception helps the analyst rapidly find what they care about, making sure your network is as secure as it can possibly be.

 

Behavioural

Perception is designed to pick out behaviours on a network rather than relying on a list of rules.  This means it is far more difficult for malicious activity to hide without fundamentally changing the way it works.

Blazing Fast

Based on Lawful Interception technology, Perception sits at the core of the network and collects data at incredibly fast rates.  This means that the system and the analysts have the biggest quantity and best quality data to work from.

Intelligent

Perception avoids the common high false alarm and low detection rate issues of anomaly detection systems by analysing all network traffic.  It then uses advanced analytical techniques on the most anomalous data. 

What Network Analysis Systems Are (And Why They Matter)

 

Network Monitoring systems like Perception are designed to give the user a deep level of understanding about their network and the activity on it.  From a protection perspective they differ from perimeter security and endpoint solutions by ignoring the exploits themselves and instead identifying the behaviour that results from the exploit.  This means that Network Monitoring systems are able to identify all malicious behaviour regardless of source or intent.  They also have the added benefit of being able to discover network weaknesses or points of greatest vulnerabilities before they are taken advantage of.

 

There Might Be Something You're Forgetting

Perimeter:

  • Known threats entering network
  • Known signatures entering network
  • Traffic to / from known malicious sources

Network Monitoring:

  • Unusual and threat-like behaviour between hosts
  • Network vulnerabilities
  • Policy breaches
  • Unknown / zero-day threats
  • Surveillance and pre-attack phase activity

Endpoint:

  • Known threats on hosts
  • Known signatures on hosts
  • Unusual user behaviour
 
 

Firewalls, Intrusion Detection Systems (IDS) and anti-virus only form part of modern cyber security defences. The security gap that most organisations are exposed to exists within their own network.

Perception is able to address the problems left by traditional endpoint and perimeter protection systems by working at very high data rates at the core of the network while using complex logic to perform in depth analysis and behaviour identification of all network traffic.

Whether this is a threat which has circumvented the rules-based or sand-boxing appliances, or data being leaked by a trusted device or human error, this activity can be detected by effective real-time internal network monitoring. Until now this has proved an almost impossible task, given the volume of data which flows at the network core in even the most basic of networks.  Perception solves this key issue and is designed to work alongside industry-leading perimeter and endpoint solutions so our customers are protected across their whole network, not just the edges.