SOLUTIONS

Solutions Integrator, Reseller & Service Provider

CLOAKING
DECEPTION
MAXIMUM DATA TRANSFER
NETWORK PERFORMANCE MANAGEMENT

Enterprises and service providers need to deliver more secure and resilient business services in today’s rapidly evolving technology, computing and cyber threat environments. This need can be addressed by implementing adaptive security models that prevent known and unknown attacks, rather than simply detecting and reacting to attacks once networks and sensitive data have already been breached. Developed for the US Department of Defense, this solution provides an adaptive cyber defense solution that proactively isolates cloud services, cloaks and protects servers and segments networks. This new level of real-time protection blocks or redirects unidentified and unauthorized traffic to stop cyber-attacks and unauthorized access, including port scanning and reconnaissance. This greatly reduces risk, simplifies compliance, and increases operational efficiency by eliminating unauthorized traffic from networks and server.

The deception platform detects advanced threats as they propagate throughout the

organization’s network and data center. Designed to augment and extend the value of existing security systems. The dynamic-detection engagement servers lay strategic traps throughout the enterprise to deceive, detect, and defend against attacks as they begin scanning, targeting, and probing network clients, servers, and services for targets.

Based on active decoys and dynamic deception technology, the solutions engage with

attackers in real-time, immediately notifying prevention systems and stopping attackers in their tracks. The platform runs real operating systems, full services, and applications, along with the ability to completely customize the environment by importing the organization’s golden images and applications. As a result, the OEM provides an authentic environment that is baited with lures and traps while being indistinguishable from company servers. Additionally, the platform only generates accurate, actionable alerts based on the solution’s engagement with the attack, greatly reducing the time it takes to detect and shut an attack down.

The alerts include valuable details, such as:

  • IP addresses of infected machines
  • Username and password combinations
  • Any dropped payloads including location and type of attacks
  • Attack activity, including any data it has targeted for download or export
  • Lateral movement inside the platform
  • Any system/kernel changes, process creation, process injection, registry, and network activity

The platform feeds events to the OEM’s networks patented Multi-Dimensional Correlation Engine to generate attack sequences that provide organizations with an accurate catalog of all the attack’s activity. This solution will also provide multiple reports in various formats with the forensics required to capture attacker method and intent, update prevention systems, and prevent future attacks. The threat intelligence dashboard provides a centralized, easy viewing display and an organized way to drill down into attack information.

This solution addresses Data Transfer Rates/Bandwidth Utilization across long distance and high latency links.  This solution greatly enhances utilization of current bandwidth resulting in an increase of file transfer rates by 800%.  This solution is not a WAN Optimization/Deduplication/Compression tool, instead allows you to extend the WAN fabric globally while maintaining highest security standards and with no need for manipulation of data in most cases.

Below are some used case examples that this solution fits best:

  • Datacenter Replications
  • File transfers over long distances or high latency networks
  • Disaster Recovery/COOP environments
  • Allows to maintain central data repositories since it allows for highly efficient data transfer rates, eliminating the need to make copies of data.
  • Works with majority of the links including Satellite.
  • No hardware rip and replace needed and no software installations needed.

The key is to improve the efficiency of the available bandwidth.  The solution will run over existing networks, meaning that no “rip and replace” must take place.

Proposed Solution Differs

Network Runners understands that there are several reasons why traditional WAN Optimization is not appropriate.  Traditional solutions change the data in some way, usually through compression of the data.  Network Runners understands that the nature many files, such as image files do not allow for any manipulation of the data to take place.

NRI therefore proposes a solution that does not manipulate the data in any way.  Not only does this have the benefit that the data files are in no way modified during their transmission, it also allows for encryption of the data to take place.   The key difference for the NRI solution is that we are optimizing the link – not the data.   The proposed solution will greatly reduce the time that it takes to move large files over long distances.  The longer the distance, the more dramatic the improvement. The following illustration exemplifies the degree of performance that can be expected.

The Illustration shows a transfer of a terabyte file from Washington, DC to San Diego and another transfer of a terabyte from Washington, DC to Japan.  In the case of the file transfer from DC to San Diego, using traditional TCP/IP, the transfer takes 4 hours and 39 minutes.  Using the NRI proposed solution, that transfer is reduced to only 14 minutes and 11 seconds.

Using traditional TCP/IP to send the same file from Washington, DC to Japan now takes 11 hours and 29 minutes.  Using NRI’s proposed solution, the transfer takes only 15 minutes and 30 seconds.

Network Runners can provide a comprehensive proposal with more specific information as required.

Holistic service assurance depends on real-time analysis of traffic flowing throughout your complex, global network. Visibility into important service aggregation points such as data centers, application server clusters, server farms, remote and branch offices, and the network edge, supplies the metrics necessary to effectively monitor service delivery. This platform equips you with clear insights for rapid troubleshooting of issues and enables you to provide extraordinary service quality and is powered by Adaptive Service Intelligence (ASI) technology, which proactively collects, organizes, and analyzes traffic data to provide rich information about the performance of business services and unified communications. Armed with this data, you can quickly determine which database server, network appliance or web service is the root cause and take steps to resolve the issue before it becomes a widespread problem.

This technology gathers traffic data from key vantage points throughout the IT environment using ASI – a passive, non-disruptive and scalable technology. Software monitoring solution delivers real-time alerts and takes the guess work out of troubleshooting, remediation and continuous improvement.

  • Detect, diagnose and resolve performance issues immediately
  • Predictive & Proactive Network Alerting & Alarming
  • Uptime, Availability & Performance Management
  • Multi-tiered Network Visibility
  • Automated Network Mapping, Dependency and Device Discovery

Cloacking

Cloacking

Enterprises and service providers need to deliver more secure and resilient business services in today’s rapidly evolving technology, computing and cyber threat environments. This need can be addressed by implementing adaptive security models that prevent known and unknown attacks, rather than simply detecting and reacting to attacks once networks and sensitive data have already been breached. Developed for the US Department of Defense, this solution provides an adaptive cyber defense solution that proactively isolates cloud services, cloaks and protects servers and segments networks. This new level of real-time protection blocks or redirects unidentified and unauthorized traffic to stop cyber-attacks and unauthorized access, including port scanning and reconnaissance. This greatly reduces risk, simplifies compliance, and increases operational efficiency by eliminating unauthorized traffic from networks and server.