Detect APTs with Network Traffic Analysis

Detect the unknown

Unknown Advanced Persistent Threats (APTs) pose an increasing risk to networks worldwide. They bypass existing security tools and stay hidden for several weeks. They strike when the time is right – inflicting hundreds of billions of dollars of damage, or worse.

They may be in your network, but your existing security tools are not be able to detect them.

Network Traffic Analysis (NTA) is an effective tool to detect APTs before they can do damage to your network. NTA uses a combination of artificial intelligence, machine learning, rich network traffic metadata, and content inspection to detect threats. NTA monitors network communications between devices on the network, as well as those coming into and going out of the network, to identify possible threats. 


APTs exploit the gaps in existing security tools. Rule-based security tools – like firewalls and intrusion detection systems must know a threat before it can be detected. APTs are unknown; which means APTs can evade these tools. APTs also bypass sandboxes, infect IoT and BYOD devices; where endpoint security cannot be installed, and attack SCADA networks. Log management solutions like SIEMs are difficult to deploy, analyze events after the fact, and generate high levels of false positives. Security solutions which rely heavily on NetFlow and/or IPFIX protocols are also ineffective against APTs, because these data protocols lack sufficiently detailed network traffic metadata for effective security.


  • Monitors network traffic to detect threats
  • Detects unknown threats by what they do,
  • in real time
  • Risks are identified before damage can occur
  • Offers full visibility for every single device, single host, single subnet on the network,
  • and their communications up to L7
  • Effective on SCADA networks