SlideShare a Scribd company logo
Overview
PART I: Cyber & Our Solution
PART II: Technical Details
 Founded in 2008 by 2 R&D directors from Allot Communications
 Extensive experience in networking, infrastructure, intelligence, data aggregation
 Current customers include: government, enterprises and mobile operators
 High-performance solutions for Network Intelligence (URL Filtering, Load Balancing and
Network Analytics for Layer 7)
 Security Solutions for Network Forensics
About Agata
 Intellectual Property (IP) is not safe
 Man in the middle attacks by criminals
 Data theft
 Financial theft
 Espionage
 Organization is legally liable
Risks and Threats From Cyber
Focus on malware signatures – won't
find the infected machines
 Real-time (and Back-in-time ) analysis of data
 Find threats by:
 Analyzing unknown or suspicious files to uncover malicious behaviors
 Using packet captures (PCAP) to record the unknown traffic
 Utilizing behavioral botnet reports
 Identify unknown mobile users, known exploits, remote users
 Identify unknown geographical (and domain) sources of traffic
 Analyze download history and content
 20 Gbps Continuous packet capture with nanosec time stamping
Agata Forensics Solution
Record – Analyze - Track
 Using Agata DPI Probe for 20Gbps traffic
 High speed Layer-7 analysis (Meta data) and storage of data
 Probe Network hierarchy: Passive tapping
 Processing/collecting information based on tens of thousands of filters
 Redirecting filtered traffic to external servers for advanced analysis
 Using the following Agata capabilities:
 Filter/Layer-7 classification engine
 Traffic decapsulation (MPLS, PPoE)
 Up to 50,000 overlapping policy rules
 Rules are defined by conditions and actions
 Integration with advanced storage and analysis systems
 Filtered sessions enriched with DPI results (App ID)
Agata Use Case:
Very Large Traffic Analysis at
Asian Network (mn's of users)
DPI Engine
Data Collection
Reports
L7 Load Balancing
URL Filtering
Hardware Configurations
PART II:
Agata Technical Details
 Agata’s Network Intelligence is based on an advanced dynamic DPI engine for high speed
networks, data aggregation (big data) and analysis tools.
 Agata’s DPI based probes supports up to 20Gbps per blade.
 The probes are based on Broadcom XLP Multicore processors or Cavium Octeon.
Dynamic DPI engine
Topology
 Network analytics with sessions statistics, Protocols/Applications metadata extraction.
 The DPI engine identifies more than 1,000 applications and protocols (e.g. Skype,
Facebook, YouTube, Emails, etc.) and detects Non-standard/untrusted traffic and Traffic
headers modification.
 Provides full visibility and ability to find the relevant data with easy to use tools
 Extensive of on-demand/scheduled reports and graphs
 Extraction of network, metadata, subscribers, devices information
 Convert network traffic into content (Web pages, Emails & attachments, Instant Messages, VoIP)
 Keyword searching using regex in collected and indexed data and content
 Alerts and actions
 A centralized dashboard view
Network Analytics
 List of unknown encrypted sessions
 List of email attachments that were sent during certain time window
 Report on user’s traffic anomaly (e.g. access from Dev department to finance dep.)
 Report of sessions to unknown external geo-location
 Report on file sharing application usage: Dropbox, Skype, Google drive.
 Report on remote control sessions: SSH, Telnet, RDP, Teamviewer
 Content based reports – list of content containing specific regular expressions
 Event report (identify event anomaly such as change in protocol headers)
Cyber Forensics Reports – examples
Collected Information
Network Data Examples
• Unique ID
• Timestamp
• Site
• Subscriber Name/ID
• Statistics
 Session Duration
 Bytes In/Out
 Packets In/Out
 Live Connections
• Networking
 Source/Destination MAC addresses
 Encapsulation
 Protocol Type: IP/TCP/UDP
 Source IP and Port
 Destination IP and Port
 Protocol /Application
 Information from packet header/data
Statistics reports and graphs
Per session statistics (Bytes/Packets and Connections) on the network traffic is collected
constantly
An administrator can generate large variety of on-demand scheduled reports and graphs
The report generator interface allows drilling-down from all-network view to single session view
Metadata reports
Applications metadata is collected constantly
The system collects metadata on applications like WhatsApp, HTTP, VoIP, Emails, etc
The metadata is can be exported via csv files or SQL based DB interface.
Reports
 Advanced Layer 4 and Layer 7 load balancing
 The filters and classification engine supports up to 50,000 overlapping policy rules and
the rules are defined by conditions and actions
 The supported load balancing algorithms are:
 Round robin
 Weighted round robin
 Least loaded port
 Least connections per port
Layer 7 Load Balancer
 An online content filter demands to protect users (mobile and others) at risk
 HTTP/HTTPS support
 URL filtering by category
 File type blocking
 SSL Inspection
 Application Control
 P2P and IM blocking
 Internet applications blocking
 IP and Port blocking
 Provides social Media behaviour reports
URL Filtering
Probe – Hardware Option 1
HP Server + Cavium Octeon PCIe card
Probe – Hardware Option 2
Broadcom XLP
Thank You
Udi Levin
C. +972.544.510670
M. udi.levin@agata-solutions.com

More Related Content

What's hot

Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
ServicePilot
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
ChAnushaECE
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
Lucas Ko
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Mumbai Academisc
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
SushrutaMishra1
 
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
APNIC
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
FabMinds
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
inventionjournals
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Jeanie Lo
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
SubbuBuddu
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
sarah ho
 
IOT beginnners
IOT beginnnersIOT beginnners
IOT beginnners
udhayakumarc1
 
Cisco Stealtwatch
Cisco StealtwatchCisco Stealtwatch
Cisco Stealtwatch
Rayudu Babu
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
kayi0920
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
Ming Hei Jemma Cheung
 

What's hot (18)

Deep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilotDeep Flow Monitoring with ServicePilot
Deep Flow Monitoring with ServicePilot
 
Chapter 1 pdf
Chapter 1 pdfChapter 1 pdf
Chapter 1 pdf
 
Insider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBAInsider Threats Detection in Cloud using UEBA
Insider Threats Detection in Cloud using UEBA
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)Constructing inter domain packet filters to control ip (synopsis)
Constructing inter domain packet filters to control ip (synopsis)
 
IoT heap 1
IoT heap 1IoT heap 1
IoT heap 1
 
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
Reporting Network Abuse and APNIC Whois Database Accuracy by Aftab Siddiqui [...
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Blug Talk
Blug TalkBlug Talk
Blug Talk
 
Ug 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabusUg 3 1 r19 cse syllabus
Ug 3 1 r19 cse syllabus
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
IOT beginnners
IOT beginnnersIOT beginnners
IOT beginnners
 
Cisco Stealtwatch
Cisco StealtwatchCisco Stealtwatch
Cisco Stealtwatch
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 

Similar to Agata overview

IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
IRJET Journal
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
Joachim Surich
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksSmartenIT
 
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Motadata
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
Mihajlo Prerad
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview
viswesvaran d
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlowAuditor
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
Seculert
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
ImXaib
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
edwardstudyemai
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
Programmer
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
CHAKER ALLAOUI
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
Firoze Hussain
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
Rick G. Garibay
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
InformaticaMarketplace
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
Jeff Green
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
Cisco DevNet
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
kristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 

Similar to Agata overview (20)

IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
IPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content AnalysisIPCA - Intelligent Protocol Content Analysis
IPCA - Intelligent Protocol Content Analysis
 
Traffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community NetworksTraffic Profiles and Management for Support of Community Networks
Traffic Profiles and Management for Support of Community Networks
 
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
Product Presentation - Motadata Unified Platform for IT Monitoring, flow anal...
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
Linux IT Monitoring tools - An Overview
Linux  IT Monitoring tools - An Overview Linux  IT Monitoring tools - An Overview
Linux IT Monitoring tools - An Overview
 
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
 
Application Programming Interface
Application Programming InterfaceApplication Programming Interface
Application Programming Interface
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Network monotoring
Network monotoringNetwork monotoring
Network monotoring
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
Cs Wif I System Overview 2009
Cs Wif I System Overview 2009Cs Wif I System Overview 2009
Cs Wif I System Overview 2009
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Streaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data StreamStreaming real time data with Vibe Data Stream
Streaming real time data with Vibe Data Stream
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
 
13.) analytics (user experience)
13.) analytics (user experience)13.) analytics (user experience)
13.) analytics (user experience)
 
Data in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathonData in Motion - tech-intro-for-paris-hackathon
Data in Motion - tech-intro-for-paris-hackathon
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 

Recently uploaded

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Agata overview

  • 1. Overview PART I: Cyber & Our Solution PART II: Technical Details
  • 2.  Founded in 2008 by 2 R&D directors from Allot Communications  Extensive experience in networking, infrastructure, intelligence, data aggregation  Current customers include: government, enterprises and mobile operators  High-performance solutions for Network Intelligence (URL Filtering, Load Balancing and Network Analytics for Layer 7)  Security Solutions for Network Forensics About Agata
  • 3.  Intellectual Property (IP) is not safe  Man in the middle attacks by criminals  Data theft  Financial theft  Espionage  Organization is legally liable Risks and Threats From Cyber Focus on malware signatures – won't find the infected machines
  • 4.  Real-time (and Back-in-time ) analysis of data  Find threats by:  Analyzing unknown or suspicious files to uncover malicious behaviors  Using packet captures (PCAP) to record the unknown traffic  Utilizing behavioral botnet reports  Identify unknown mobile users, known exploits, remote users  Identify unknown geographical (and domain) sources of traffic  Analyze download history and content  20 Gbps Continuous packet capture with nanosec time stamping Agata Forensics Solution Record – Analyze - Track
  • 5.  Using Agata DPI Probe for 20Gbps traffic  High speed Layer-7 analysis (Meta data) and storage of data  Probe Network hierarchy: Passive tapping  Processing/collecting information based on tens of thousands of filters  Redirecting filtered traffic to external servers for advanced analysis  Using the following Agata capabilities:  Filter/Layer-7 classification engine  Traffic decapsulation (MPLS, PPoE)  Up to 50,000 overlapping policy rules  Rules are defined by conditions and actions  Integration with advanced storage and analysis systems  Filtered sessions enriched with DPI results (App ID) Agata Use Case: Very Large Traffic Analysis at Asian Network (mn's of users)
  • 6. DPI Engine Data Collection Reports L7 Load Balancing URL Filtering Hardware Configurations PART II: Agata Technical Details
  • 7.  Agata’s Network Intelligence is based on an advanced dynamic DPI engine for high speed networks, data aggregation (big data) and analysis tools.  Agata’s DPI based probes supports up to 20Gbps per blade.  The probes are based on Broadcom XLP Multicore processors or Cavium Octeon. Dynamic DPI engine
  • 9.  Network analytics with sessions statistics, Protocols/Applications metadata extraction.  The DPI engine identifies more than 1,000 applications and protocols (e.g. Skype, Facebook, YouTube, Emails, etc.) and detects Non-standard/untrusted traffic and Traffic headers modification.  Provides full visibility and ability to find the relevant data with easy to use tools  Extensive of on-demand/scheduled reports and graphs  Extraction of network, metadata, subscribers, devices information  Convert network traffic into content (Web pages, Emails & attachments, Instant Messages, VoIP)  Keyword searching using regex in collected and indexed data and content  Alerts and actions  A centralized dashboard view Network Analytics
  • 10.  List of unknown encrypted sessions  List of email attachments that were sent during certain time window  Report on user’s traffic anomaly (e.g. access from Dev department to finance dep.)  Report of sessions to unknown external geo-location  Report on file sharing application usage: Dropbox, Skype, Google drive.  Report on remote control sessions: SSH, Telnet, RDP, Teamviewer  Content based reports – list of content containing specific regular expressions  Event report (identify event anomaly such as change in protocol headers) Cyber Forensics Reports – examples
  • 11. Collected Information Network Data Examples • Unique ID • Timestamp • Site • Subscriber Name/ID • Statistics  Session Duration  Bytes In/Out  Packets In/Out  Live Connections • Networking  Source/Destination MAC addresses  Encapsulation  Protocol Type: IP/TCP/UDP  Source IP and Port  Destination IP and Port  Protocol /Application  Information from packet header/data
  • 12. Statistics reports and graphs Per session statistics (Bytes/Packets and Connections) on the network traffic is collected constantly An administrator can generate large variety of on-demand scheduled reports and graphs The report generator interface allows drilling-down from all-network view to single session view Metadata reports Applications metadata is collected constantly The system collects metadata on applications like WhatsApp, HTTP, VoIP, Emails, etc The metadata is can be exported via csv files or SQL based DB interface. Reports
  • 13.  Advanced Layer 4 and Layer 7 load balancing  The filters and classification engine supports up to 50,000 overlapping policy rules and the rules are defined by conditions and actions  The supported load balancing algorithms are:  Round robin  Weighted round robin  Least loaded port  Least connections per port Layer 7 Load Balancer
  • 14.  An online content filter demands to protect users (mobile and others) at risk  HTTP/HTTPS support  URL filtering by category  File type blocking  SSL Inspection  Application Control  P2P and IM blocking  Internet applications blocking  IP and Port blocking  Provides social Media behaviour reports URL Filtering
  • 15. Probe – Hardware Option 1 HP Server + Cavium Octeon PCIe card
  • 16. Probe – Hardware Option 2 Broadcom XLP
  • 17. Thank You Udi Levin C. +972.544.510670 M. udi.levin@agata-solutions.com