Network monitoring vendor - Sycope is introducing version 2.3 of its network monitoring and security tool. 

The solution is based on real-time flow analysis enriched with business context and supports companies in securing performance and improving IT security. The new version brings numerous improvements and functional enhancements.

Sycope 2.3

Sycope 2.3 records, processes, and analyses all parameters contained in the data streams, supplemented by SNMP, geolocation, and security feeds. This makes it possible to detect network problems, measure delays and identify security threats. The tool supports NetFlow, SFlow, IPFIX, and NSEL protocols.

Sycope's security function was developed based on the MITRE ATT&CK methodology. Syncope 2.3’s rules and mechanisms for detecting security incidents make it possible to counter-attack and detect undesirable activities in the network at an early stage.

Features 

The out-of-the-box solution is easy and quick to install, characterized by high flexibility and efficiency

The complete system consists of individual modules for visibility, performance, and security which can be administered under a common and informative user interface.

The out-of-the-box solution is easy and quick to install, characterized by high flexibility and efficiency, and allows big data analyzes with its own query language.

New updates

The new version updates include:

  • User scripts, enable seamless and flexible integration with external systems or services.
  • 40 + network threat hunting searchers, out-of-the box to be used.
  • Data role-based access control (data RBAC) for streams and exporters.
  • Dynamic Baseline with trend analysis, visualization, and recurrent comparisons.
  • High performance with 120k/250k fps on a single all-in-one VM.

Performance and security

These innovations are based on Sycope's own research and development, implementing customer feedback from the field.

The aim of the development is not only to provide data, but also the necessary answers to effectively improve performance and security in the network.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...