Byte25 delivers a comprehensive set of reports from the central web based dashboard (either cloud based or on-premise). The central dashboard correlates data from all installed appliances to provide a clear picture of network performance and cyber security posture from a very high level right down to each individual flow.
IT visibility shouldn’t be hard, Byte25 provides the perfect solution to plug the visibility black spots.
Byte25 utilises deep packet inspection (DPI) techniques to inspect packet payloads to identify specific applications traversing the network. DPI techniques allow for comprehensive application classification even where applications may share common TCP port numbers such as HTTP. As the volume of encrypted traffic increases, DPI becomes increasingly challenging. Byte25 addresses this challenge by utilising industry leading techniques such a TLS inspection to ensure effective application classification for encrypted and non-encrypted traffic.
Visibility tools shouldn’t be complex. Ease of use is essential in ensuring that tools continue to deliver return on investment after deployment. The Byte25 engineering team has been building visibility tools for decades and have a deep understanding of how to present information in a simple intuitive way.
The Byte25 performance dashboard provides a quick and detailed summary of site and network performance with context sensitive ‘clickable’ graphs providing the ability to drill down from a high level view to specific data in a few simple clicks.
Remote sites typically consist of multiple subnets or VLANs. Byte25 monitors multiple subnets within each branch and provides a a tabular view to allow for quick identification of subnet specific performance or potential issues. The subnet view presents summary information as well as hyperlinks links to easily drill down for more information.
Modern business work flows require significant user interaction with Internet facing applications and cloud based services. Byte25 identifies the geographic location of all publicly facing traffic flows to easily identify where users are travelling to, on the net. By monitoring the source country of incoming traffic, anomalous or potentially malicious traffic can often be identified.
To effectively analyse and measure end user experience, it is critical to be able to collect latency, packet inter arrival times and jitter. Byte25 calculates packet inter arrival time on every packet allowing for deatiled latency statistics to be calculated on a per appliaction, per host or per subnet basis.
Byte25 uses a sophisticated measure of latency, the variance of inter packet arrival time. Similar to jitter, this presents an accurate picture of performance across the network.
The latency dashboard presents a simple and concise picture of latency clearly identifying th ebest and worst performing hosts and appliactions. Similar to all Byte25 dashboards, the latency dashboard also allows drill downs and filters for easy diagnosis of network issues.
A full packet capture engine is included with a Wireshark style web front end including full filtering capability. The packet capture module allows for network engineers to perform full packet capture and decodes at remote sites using a normal web browser. This ability negates the requirement to dispatch an engineer with a dedicated packet analyser.
Packet captures are stored in standard PCAP format and may be downloaded for further analysis in third party analysers if required.
Whilst Byte25 appliances can operate standalone, they are commonly coupled with a broader distributed solution for complete enterprise visibility. Byte25 can export information to a cenralised cloud or on-prem server to provide a single data repository for enterprise wide visibility.
The Byte25 distributed scaleable architecture allows for visibility from very small sites right through to large enterprise potentially monitoring thousands of subnets.
Threat Detection at the edge is becoming increasingly relevant as more remote and branch sites connect directly to the internet via SD-WAN style connections. Even where networks are secured with effective perimeter security measures such as firewalls, internal threat detection provided by Byte25 can often identify malicious lateral movement behind the firewall.
Correlation of the Threat Detection and Performance datasets within the Byte25 solution provides the most comprehensive visibility solution for identifying and acting upon anomalous network activity.