sb-au logo
Story image

LogRhythm’s Network Monitor Freemium an impressive winner when put to the test

02 May 2017

Network monitoring is a key part of operations and security - especially as more attacks hide themselves on your targeted networks. But not all security tools have to come with a price tag.

The SANS Institute, a trusted InfoSec training institution, tested LogRhythm’s Network Monitor Freemium (NetMon Freemium) Version 3.2.3 with several key areas of focus in mind.

Those focus areas were usability; accurate traffic detection and profiling; detection of patterns and drilldown into sources; sensitive data identification and data loss prevention; network forensics; and full packet capture and file reconstruction.

The results? NetMon Freemium is intuitive and displayed powerful monitoring capabilities for enterprises of any size. And in just 30 minutes SANS felt it had mastered the software.

Why is LogRhythm’s NetMon Freemium so powerful? Read more in the ‘Packets Don’t Lie: LogRhythm NetMon Freemium Review’, produced by SANS and sponsored by LogRhythm.

The white paper:

  • Shows how NetMon Freemium works
  • Goes through a step by step process of how it performs
  • Provides real life use cases such as malware, nuisance apps and bandwidth hogs
  • Why NetMon Freemium is just as much an analysts’ tool as a network detection tool
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
Video: 10 Minute IT Jams - Who is CrowdStrike?
Today, Techday speaks to CrowdStrike ANZ channel director Luke Francis about the company's key products and offerings, its upcoming annual security conference, and the infrastructure it leverages in the A/NZ region.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
Video: 10 Minute IT Jam – Who is Cohesity?
If you could pick two words to describe Cohesity, ‘data management’ fit very well.More