NPM, DDoS mitigation management, Peering Analysis, and ultimately Security — they all flow from one common root: Visibility at Scale.
FlowTraq supports all flow formats, and “normalizes” their content. This means you can mix and match flow sources, and filter, view, and compare traffic from any datasource in your network. Even when some are sampled, and others are not. We encourage the operator to improve security visibility by collecting data from as many flow capable devices as possible in the network. Visibility starts with data sources.
Data sources are only half of the security visibility story. The ability to arbitrarily filter, view, and manipulate the data is what turns the data into valuable security intelligence. FlowTraq gives the operator infinite control over how to filter the data, and how to view the data. Boolean filtering control allows you to zero in on the needle in the haystack, which include botnet command & control channels, rootkit and backdoor communications, and data leaks. It also gives you unprecedented control over performance sensitive data by creating arbitrary top-N lists of any aspect of your network traffic.
Doing meaningful analysis with flow data requires a big data approach to data management. FlowTraq uses a patented database technology designed for handling infinite amounts of flow data, without needing to aggregate. Flow aggregation is a common technique to cope with scalability problems, but it greatly impairs the accuracy of the data and makes it useless for security visibility purposes. Built for modern parallel architectures, FlowTraq makes optimal use of all the compute and IO resources available, so you do NOT need to aggregate your valuable flow data.
The FlowTraq database features a “triple-split” design, where flow data can be stored in progressively slower, but larger storage layers. The most recent flow data is quickly and directly available from the RAM database. Longer queries are serviced from a local SSD database, while the furthest history is stored on archive that can be provisioned on spinning RAID, or remote SAN/NAS solutions. This ensures the operator has fine-grained control over retention history of forensically accurate flow data, without breaking the hardware budget.
Network Performance Management is all about understanding how traffic volumes and patterns are changing in your environment. FlowTraq builds baselines of normal traffic, and stores long term trends for all your interfaces, and network traffic groups. These include top-N lists of top talkers, top endpoints, as well as source and destination country, and autonomous system. These let you quickly evaluate peering relationships and link utilization over years of collected data.
FlowTraq detects a complete range of network anomalies. Including simple traffic threshold alerts, deviations from baselines, as well as Distributed Denial of Service events, and security violations. Use FlowTraq to detect data leaks from your network, zombie botnet control channels, malicious services popping up in your network, and scanning and brute-force password behavior. Alerts are delivered by email, or to the SIEM of your choice. Thanks to a flexible plugin architecture, FlowTraq can even take mitigating actions when bad behaviors are detected.
Have a lot of flow? No problem. Our patented flow analysis clustering technology allows you to run FlowTraq over multiple servers at once, combining their storage and processing power to handle unlimited quantities of flow data. As your flow volumes grow, you can simply add additional hardware or virtual containers, and they will transparently add to the collective power of the FlowTraq cluster. Our own distributed cloud service is handling 22 million flow records per second at peak!
Security visibility is all about control and data integration. FlowTraq ships with a full suite of command-line tools (available on all our supported platforms) plus a complete REST-API, that enables you and your scripts to interact directly with the distributed FlowTraq database. Supporting all common data formats, from CSV to JSON, the CLI and API interface brings all the power of FlowTraq into an easily scriptable package.
FlowTraq offers a two deployment models: our servers, or your own. The FlowTraq managed cloud is built upon the dependable resources from AWS, Azure, and Google. Simply create your account, and start sending flow. If you instead prefer to keep the flow local to your environment, simply download the Virtual Appliance Container, and run FlowTraq from ESXi, KVM, or Hyper-V. Learn more about Flowtraq’s server hardware requirements.
Built with a multi-tenant database core, you can create as many partitions as needed to support a diverse range of end-customers. Each partition is fully independent yet receives access to the full storage and compute resources of the entire FlowTraq cluster. Partitions support both regular and administrative users, and have their own monitoring and security policies. A single FlowTraq cluster supports thousands of partitions.
Use our lightweight flow proxy daemon to collect flow at remote sites, encrypt it, and bring it back to your central multi-tenant FlowTraq installation. Our proxy daemon is free of charge, and can easily be deployed in local CPE devices, or run on a small server in the remote environment. Original exporter addresses are maintained, so no visibility is lost. Combined with FlowTraq multi-tenant partitioning, there are no collisions when there is IP address range overlap between multiple remote sites. Each partition is completely independent from the others.
When a DDoS attack is detected, FlowTraq will automatically select and invoke the appropriate response. Thanks to integration with dozens of scrubbing and mitigation vendors, FlowTraq is able to automatically pick the best mitigation approach for each attack, maximizing mitigation effectiveness, and minimizing your cost-to-mitigation. Support scrubbers include: A10 TPS, RadWare DefensePro, ForiDDoS, Verisign OpenHybrid, and Voxility.