The NTSS system works as a "flight recorder's black box" for storing all network traffic that goes in or out of the computer network of interest.
It comes with an easy to use Google-like search and analytics software enabling to retrieve any suspicious traffic by any content or parameters within the IP packets it has captured. Investigators can rapidly address key questions posed by security incidents when they are most needed:
Clusterpoint NTSS is used as an Internet data traffic recording and archiving system, which captures all IP packets from an Ethernet network, re-engineers relevant traffic back to the application level content (Web pages, e-mails, downloaded and uploaded files etc.) and stores it into the Clusterpoint scalable and searchable database for archiving, risk analytics, forensics, audit and compliance needs.
Designed to meet the increasing needs of Corporate Governance, Electronic Records Management and Regulatory Compliance associated with communications transacted to/from the legal entity of the organization, NTSS monitors, indexes and stores all content and communications that are transacted across the network.
Typically positioned at the Internet boundary (on the monitoring-port of a switch or network tap) NTSS enables immediate visibility of e-mails and attachments sent/received, web-mail, web-pages viewed, web postings, instant messaging chat conversations, files transferred in an intuitive & easy-to use web GUI.
Interested to find out more about NTSS suitability for your company needs? Get in touch with our sales department!