Log Analytics and Configuration Management Software for Network Security Devices

Gaining network activity insights and keeping abreast about firewall log is a challenging task as the security tool generates a huge quantity of traffic logs. Introducing Firewall Analyzer, an agent less log analytics and configuration management software that helps network administrators to understand how bandwidth is being used in their network. Firewall Analyzer is vendor-agnostic and supports almost all open source and commercial network firewalls such as Check Point, Cisco, Juniper, Fortinet, Palo Alto and more.

Features

Manage Firewalls, VPN, Proxy Server, IDS & IPS for Security, Compliance and Bandwidth



Firewall Policy Management

Firewall Policy Management

Analyze the usage and effectiveness of the Firewall rules and fine tune them for optimal performance.

Change Management

Change Management

Get instant notification about the changes made and get a complete trail of all the changes done to your firewall configuration with Change Management reports.

Just-in-time privilege elevation

Network Security Management

Get detailed information on all possible network attacks and security breaches in your network.

User internet activity monitoring

User internet activity monitoring

Automatically identify users across various categories such as streaming videos, file sharing networks, social networks etc. This gives you greater visibility into the high risk users.

Real-time VPN and Proxy Server Monitoring

Real-time VPN and Proxy Server Monitoring

Obtain active VPN users, user-specific & user group specific VPN usage, sessions, and bandwidth consumed.

Compliance Management

Compliance Management

Automate compliance audits with out-of-box reports and get your firewall security validated with security audit and device configuration analysis reports.

Network Forensic Audits

Network Forensic Audits

Search the logs and pinpoint the exact log entry which indicates the cause of the security event in minutes.

Log Analysis

Log Analysis

Gain insight into security threat and traffic behaviour to improve the network security posture.

Network Traffic and Bandwidth Monitoring

Network Traffic and Bandwidth Monitoring

Perform network behavioral analysis by monitoring for sudden spikes in bandwidth consumption and get in-depth details about users.





Firewall Device Management
  • Firewall Rule Management
  • Firewall Policy Overview Report
  • Firewall Policy Optimization Report
  • Firewall Used Rules Report
  • Firewall Unused Rules Report
  • Firewall Rule Impact Analysis
  • Firewall Rule Reorder Recommendation
  • Security Audit & Configuration Analysis Report
  • Configuration Change Management Report
  • Rule Management Reports - Supported Firewalls
Network Security Reports
  • Firewall Reports
  • Virus, Attack, & Security Reports
  • VPN Reports
  • Application Reports for Firewall
  • Proxy Server Reports
  • Proxy Virus Reports
  • Telnet usage report
  • FTP usage report
Firewall Compliance
  • Firewall Compliance Management
  • PCI DSS Compliance Report
  • ISO 27001 Compliance Report
  • SANS Compliance Report
  • NIST Compliance Report
  • NERC CIP Compliance Report


Log Management Features
  • Firewall Log Management
  • Firewall Log Analysis
  • Virtual Firewall Support
  • Importing Firewall Log Files
  • Firewall Syslog Analysis
  • Custom Reports
  • Scheduled Reports
MSSP Features
  • Managed Firewall Service
  • Dashboard and User based Views
  • Rebranding Firewall Analyzer Web Client
Anomaly & Bandwidth Alerts
  • Firewall Alerts
  • Alert Notifications


Monitor Major Firewalls
  • Check Point Firewall
  • Cisco Firewall Rules
  • Fortinet Firewall
  • Palo Alto Firewall
  • WatchGuard Firewall
Firewall Log Analysis
  • Check Point
  • Cisco
  • Cisco PIX Device
  • Cisco ASA Device
  • CyberGuard
  • Fortigate
Security Device Log Analysis
  • Microsoft IS
  • NetScreen
  • SonicWALL
  • WatchGuard
  • Squid Proxy


Value Added Features
  • Diagnose Live Firewall Connections
  • Trend Analysis for Capacity Planning
  • Active VPN Connection Trend Reports
  • Firewall Credential Profiles
  • User/ Hostname Resolution for Reports
  • External User Authentication
Traffic & Bandwidth Reports
  • Real-time Bandwidth Monitoring
  • Bandwidth Monitoring
  • Traffic Analyzer
  • URL Monitoring
  • Employee Internet Usage Monitoring
Admin Audit & Archive
  • Firewall Admin Reports
  • Firewall Log Archiving for Compliance