top of page

What Network, Service, and Cybersecurity Operation Anomalies we can detect?

  • Network Anomalies (e.g., detect abnormal behavior on a link)

  • Application Anomalies (e.g., detect abnormal behavior on an application) 

  • Server Anomalies (e.g., detect abnormal behavior on a server)

  • User Experience Anomalies (e.g., detect abnormal behavior on a user experience)

  • Internet Service Anomalies (e.g., detect abnormal behavior on an internet service)

  • Online Service Anomalies (e.g., detect abnormal behavior on an online service)

  • DDOS Anomalies (e.g., detect abnormal behavior on DDOS attacks)

  • BOTNET Anomalies (e.g., detect abnormal behavior on BOTNET attacks)

  • Blacklist Anomalies (e.g., detect abnormal behavior on Blacklist violations)

  • Remote Hacking Anomalies (e.g., detect abnormal behavior on Remote Hacking attacks)

Where can we monitor your Network, Service, and Cybersecurity Operations Anomalies?

  • Internet:

    • Monitoring Laptop/Desktop accessing the Internet

    • Monitoring Laptop/Desktop accessing the Wireless

  • Data Center:

    • Monitoring servers in the 2-Tiers Data Center

    • Monitoring servers in the 3-Tiers Data Center

    • Monitoring Virtual Server in the VMWare Private Cloud

    • Monitoring Virtual Server in the VMWare Public Cloud

    • Monitoring Virtual Server in the Google Public Cloud

How do we monitor your Network, Service, and Cybersecurity Operations Anomalies? 

  • Internet:  We monitor the Outgoing Internet traffic by having the MacroProbe TAP into the spanned switch port or TAP into
        the Wireless Router. 

  • Data Center:  We monitor Internet Incoming traffic to the data center by having the MacroProbe TAP on the spanned switch port in the 2-tiers or 3-tiers at the front-end and/or the application logistic and/or the back-end.  For Cloud, we monitor the Internet Incoming traffic by having the MacroProbe TAP into the mirror ports on the vSwitch in the case of VMWare or the VPC in case of Google Cloud.  

We monitor the following metrics:

  • Link Flow

  • Application Flow

  • TCP Flow

  • DNS Lookup

  • DNS Flow

  • HTTP Flow

  • DDOS Flow

  • BONET Flow

  • Blacklist Flow

  • Remote Hacking Flow

What MacroProbe features do we use to monitor your Network, Service, and Cybersecurity Anomalies?

  • Anomaly Dashboard

  • Anomaly Evidence

  • CyberIntel Ai

Network, Service, and Cybersecurity Operations Operation Anomalies Deployment:

TAP - WAP.jpg

Monitoring Wireless

Monitoring Internet

2-Tiers-Data-Center-Monitoring (5).jpg

Monitoring 2 Tier Data Center

Monitoring 3 Tier Data Center

Cloud Monitoring

bottom of page