NetFort Advertising

NetFort Integration Options

Third party access to LANGuardian user centric wire data for deeper security and operational insight.

LANGuardian provides rich SYSLOG output and a full REST API interface for rapid integration with 3rd party products, such as SolarWinds Orion, Splunk or Aruba Clearpass NAC.

With integrations, NetFort Metadata is available for use cases including a single pane of glass view, to enhanced correlation for security event detection, to active control on your network.

NetFort LANGuardian runs on Centos 7 and can also be embedded onto SD-WAN, channel bonders and other devices or cloud application servers.

The LANGuardian REST API and SYSLOG output provides easy access to the rich network metadata held in the LANGuardian database. This allows you to seamlessly integrate with many third party systems  to provide an additional complementary data source – network and user activity data – to be integrated into dashboards, graphs, and timelines.

SolarWinds

LANGuardian brings additional troubleshooting capability to your SolarWinds environment by providing deeper insight into all aspects of user activity including:

  • Bandwidth
  • Internet
  • File shares

“‘We need greater insight over what is taking on our network, systems, services, and external web farm seen through a single SolarWinds dashboard or portal” US SME customer, online marketing and advertising.

McAfee

LANGuardian integrates seamlessly into a McAfee Enterprise Security Manager (ESM) environment to provide IT departments with an additional data stream – network user activity data

splunk

LANGuardian stores traffic data in a secure built-in database that is the basis for the advanced analytics through Splunk.

By adding LANGuardian metadata, now network and security managers have total unified visibility and a single point of access to information about every aspect, including internal activity of the IT environment. It enables administrators to also see  granular network activity data in context – for example, they can drill down to traffic activity to and from internal file shares including user names and files accessed when investigating suspicious activity.