• Address:

    No. 1403-04, Grosvenor Business Tower, Dubai-UAE

  • Contact Us:

    info@elitser-me.com | +971 4 4542741

Firewall Configuration & Log Management

Log analytics and configuration management software for network security devices

Gaining network activity insights and keeping abreast about firewall log is a challenging task as the security tool generates a huge quantity of traffic logs. Introducing Firewall Analyzer, an agent less log analytics and configuration management software that helps network administrators to understand how bandwidth is being used in their network. Firewall Analyzer is vendor-agnostic and supports almost all open source and commercial network firewalls such as Check Point, Cisco, Juniper, Fortinet, Palo Alto and more,


Features

Firewall Policy Management

Analyze the usage and effectiveness of the Firewall rules and fine tune them for optimal performance.

Change Management

Get instant notification about the changes made and get a complete trail of all the changes done to your firewall configuration with Change Management reports.

Network Security Management

Get detailed information on all possible network attacks and security breaches in your network.

User internet activity monitoring

Automatically identify users across various categories such as streaming videos, file sharing networks, social networks etc. This gives you greater visibility into the high risk users.

Real-time VPN and Proxy Server Monitoring

Obtain active VPN users, user-specific & user group specific VPN usage, sessions, and bandwidth consumed.

Compliance Management

Automate compliance audits with out-of-box reports and get your firewall security validated with security audit and device configuration analysis reports.

Network Forensic Audits

Search the logs and pinpoint the exact log entry which indicates the cause of the security event in minutes.

Log Analysis

Gain insight into security threat and traffic behaviour to improve the network security posture.

Network Traffic and Bandwidth Monitoring

Perform network behavioral analysis by monitoring for sudden spikes in bandwidth consumption and get in-depth details about users.


Firewall Security, Policy, Change, Compliance, & Bandwidth Management Software

Firewall Device Management

  •       Firewall Rule Management
  •       Firewall Policy Overview Report
  •       Firewall Policy Optimization Report
  •       Firewall Used Rules Report
  •       Firewall Unused Rules Report
  •       Firewall Rule Impact Analysis
  •       Firewall Rule Reorder Recommendation
  •       Security Audit & Configuration Analysis       Report
  •       Configuration Change Management Report
  •       Rule Management Reports - Supported       Firewalls

Network Security Reports

  •       Firewall Reports
  •       Virus, Attack, & Security Reports
  •       VPN Reports
  •       Application Reports for Firewall
  •       Proxy Server Reports
  •       Proxy Virus Reports
  •       Telnet usage report
  •       FTP usage report

Firewall Compliance

  •       Firewall Compliance Management
  •       PCI DSS Compliance Report
  •       ISO 27001 Compliance Report
  •       SANS Compliance Report
  •       NIST Compliance Report
  •       NERC CIP Compliance Report

Log Management Features

  •       Firewall Log Management
  •       Firewall Log Analysis
  •       Virtual Firewall Support
  •       Importing Firewall Log Files
  •       Firewall Syslog Analysis
  •       Custom Reports
  •       Scheduled Reports

MSSP Features

  •       Managed Firewall Service
  •       Dashboard and User based Views
  •       Rebranding Firewall Analyzer Web Client

Anomaly & Bandwidth Alerts

  •       Firewall Alerts
  •       Alert Notifications

Monitor Major Firewalls

  •       Check Point Firewall
  •       Cisco Firewall Rules
  •       Fortinet Firewall
  •       Palo Alto Firewall
  •       WatchGuard Firewall

Firewall Log Analysis

  •       Check Point
  •       Cisco
  •       Cisco PIX Device
  •       Cisco ASA Device
  •       CyberGuard
  •       Fortigate

Security Device Log Analysis

  •       Microsoft IS
  •       NetScreen
  •       SonicWALL
  •       WatchGuard
  •       Squid Proxy

Value Added Features

  •       Diagnose Live Firewall Connections
  •       Trend Analysis for Capacity Planning
  •       Active VPN Connection Trend Reports
  •       Firewall Credential Profiles
  •       User/ Hostname Resolution for Reports
  •       External User Authentication

Traffic & Bandwidth Reports

  •       Real-time Bandwidth Monitoring
  •       Bandwidth Monitoring
  •       Traffic Analyzer
  •       URL Monitoring
  •       Employee Internet Usage Monitoring

Admin Audit & Archive

  •       Firewall Admin Reports
  •       Firewall Log Archiving for Compliance

IPFIX & NetFlow Support

  •       IPFIX with Extensions Support
  •       Cisco ASA Netflow Log Analysis

Log Forensic Analysis

  •        Raw & Formatted Log Search and Reports