.

Neculus

Neculus is a next-generation cyber security monitoring and data processing solution that has evolved from mature and proven next-generarion Security Incident and Event Management (NG-SIEM) principles. It is a scalable, elastic and highly-customable solution which can be rapidly integrated into almost any technology environment. Neculus delivers cyber security intelligence to security analysts, enabling them to detect, track or stop security incidents such as external attacks or even internal fraud. By performing real-time analyses of billions of enterprise IT logs and data, Neculus is able to detect anomalies in user, system or network behavior, and correlate events and indicators using internal and external data sources. Neculus analyze information on state of the art visualization models. Complex chains of interconnected events for effortless data forensics investigations.

Main Features:

  • Big Data. Handles billions of events each day.
  • Real-time detection. Takes less than 5ms to detect an attack.
  • Automatic remediation. Automatic actions to eliminate or mitigate the risk of a live attack.
  • Hacker traps. Multiple traps are set on all over the system to catch & deceive the intruders.
  • Visual Reconstruction. Complex relations between multiple entities are displayed in an easy way to understand.
  • Forensic on a click. Investigate who’s doing what at any point back in time. Always available, just a click away.
  • Multiple input. Various input sources, such as: web/email, IPS/IDS, custom app logs, firewalls, anti virus/malware.
  • Dashboard customization. Customizable dashboard view.
  • Custom rules. Add new rules in accordance with your company policies.
  • Source code audit.
  • Advanced elastic search. Easy and flexible search million data in seconds

Benefits :

Neculus functionality would enable the End User to collect the following data types:

  • Full Content Data - Unfiltered collection of packets
  • Session Data - Conversation between nodes
  • Transaction Data - Requests and replies between nodes
  • Statistical Data - Description of traffic, such as protocol and volume
  • Meta Data - Aspects of data, who owns this IP address
  • Alert/Log Data - Triggers from Detection tools, tracking user logins
Scroll to Top