Firewall Analyzer


Software di analisi del registro del firewall

Firewall Analyzer is a log analytics and configuration management software for network security devices

Just deploying the firewall in itself will not secure your network, but the log data from your firewall needs to be continuously monitored and analyzed. There is a wealth of vital information in your firewall logs. With these logs you can detect security threats like network intrusion, virus attacks, denial of service attacks, anomalous behavior, employee web activities, web traffic analysis, etc. These logs also allow you to plan your bandwidth requirement based on the bandwidth usage across the firewalls. But manually monitoring and analyzing these logs is a time consuming task, complex, and is always prone to human error.

Firewall Analyzer is an agent-less Log Analytics and Configuration Management Software for network security devices. This firewall log analysis product is used for end-point security monitoring & analysis, change management, employee internet monitoring, bandwidth monitoring, capacity planning, policy enforcement, security & compliance audit reporting. Firewall Analyzer is vendor-agnostic and supports almost all open source and commercial network firewalls (Check Point, Cisco, Juniper, Fortinet, Snort, Squid Project, SonicWALL, Palo Alto, etc…), IDS/IPS, VPNs, Proxies and related security devices. Targeted at network security administrators & MSSPs who would like to centrally collect, archive, analyze security device logs, and generate forensic reports.

Complete list of devices supported

What problems does it solve?

Unlock the Real Value of Your Network Security Devices
Firewall Comliance Requirement

Perform Security Audit and Meet Compliance Requirements

Firewall Configuration Change Management

Firewall Configuration Change Management

  • Get instant notification on 'who' made 'what' changes, 'when' and 'why' to your firewall configuration in real-time
  • Get a complete trail of all the changes done to your firewall configuration with Change Management reports
Monitor Employee Internet Usage

Corporate Users Internet Activity Monitoring

Internet Bandwidth Monitoring - Real-time

Network Traffic and Internet Bandwidth Monitoring

  • Monitor network traffic and receive instant notification for sudden spikes in bandwidth
  • Get the interface-wise live bandwidth usage & detailed reports on which user, protocol group, network activity is consuming the bandwidth
Network External Security Threat

Network Security Management

Firewall Rules Management

Firewall Rules Management

  • Identify the highly used rules, which can be optimized to enhance the network security
  • Identify the unused rules, modify or remove them to improve firewall performance
Firewall Security Audit and Configuration Analysis

Real-time VPN & Proxy Server Monitoring

  • Obtain active VPN users, user-specific VPN usage, sessions, and bandwidth consumed
  • Monitor the outgoing traffic through the proxy, obtain details on users generating traffic, websites accessed and bandwidth consumed
Forensic Investigation Requirement

Conduct Network Forensic

Feature Comparison between Editions

All Features

Why Choose Firewall Analyzer

Unlock the real value of your security devices

  • Supports an extensive array of perimeter security device logs which include
    firewalls, VPNs, IDS/IPS and proxy servers
  • Provides a wide range of reports for external threat monitoring, change management and regulatory compliance

Attractive TCO and rapid ROI

  • No additional hardware required, minimal entry cost and maintenance inclusive subscription model ensures a low TCO
  • Competitively priced. Quick deployment, instant results, reduced IT overhead ensures rapid ROI

Meet dynamic business needs quickly

  • Rapidly transforms perimeter security device logs into actionable information
  • Generates reports in user friendly formats like PDF and CSV formats

Productivity improvement for IT / MSSP

  • From product deployment to report
    generation in minutes!
  • Real-time alerts to security events enable IT to respond instantaneously to security threats