Skip to main content

Solution Brief

Netography Fusion® for Incident Investigation and Threat Hunting

Map the Scope and Impact of Any Incident with Holistic Observability

View/Download PDF

Limitations of Conducting Forensic Investigations Using Platform-Native Tools

When a security incident occurs and your operations and incident response (IR) teams try to reconstruct the event timeline or map the scope of the event, they often cannot because of limited data and context about the assets involved:

  • Platform-native tools provide siloed views of activity in their cloud, which requires organizations to spend precious engineering resources trying to stitch together different data sources to try to reconstruct the chain of events.
  • These tools also provide limited (if any) ability to conduct forensic analysis of historical data, requiring more resources to query the limited data sets for relevant activity.
  • Another challenge is that the data lacks contextualized information, requiring additional research into the context attributes associated with the IP address of any asset.

Bottom line: Trying to map each stage of a breach or other security incident without a detailed understanding of the network activity and value of each asset involved is an exercise in futility.

“A compromise will occur in an unexpected VPC and when we go to investigate, we’ll find out that no logs are available.”

— Cloud Security Architect, B2B SaaS Provider

Give Your SecOps, NetOps, CloudOps, and IR teams a Holistic View of all Network Activity

The Netography Fusion platform aggregates, normalizes, and analyzes your VPC flow logs, VNet flow logs, on-prem flow logs and DNS logs from all your cloud providers and on-prem devices. This holistic view enables your analysts and investigators to conduct detailed forensic analysis of East/West and North/South activity between and within cloud platforms and cloud to on-prem after a security event such as a data breach.

Examples of forensics and IR activities the Netography Fusion platform supports:

  • Hunting anomalous activity in network traffic to expose the timeline of events
  • Mapping the scope and impact of the security incident, including devices and workloads accessed, in hybrid and multi-cloud environments
  • Tracing the digital footprint of the threat actor, including compromise location and subsequent East/West movement
  • Understanding the techniques used by the threat actor to move across the network

Accelerate Incident Investigation with Comprehensive Observability

Your investigation team has access to all network activity across your modern network, including IT, OT, and IoT devices at their fingertips. The Fusion platform aggregates and normalizes your network metadata before enriching it with context from your tech stack, saving you a significant amount of time.

Netography Fusion’s automated, budget-friendly retention of network traffic data provides a complete picture of past activity on your modern network. You have the flexibility to determine the data retention schedule to meet your policy requirements.

No matter how large your network is, the Netography Query Language is a powerful search technology that enables you to search billions of enriched metadata records in seconds from a single window.

Reduce the Workload of Investigators with Context-Enriched Metadata

The Fusion platform enriches your VPC flow logs, VNet flow logs, on-prem flow logs, and DNS logs with context attributes from your tech stack to provide the critical insight your teams need. Fusion incorporates context already contained in your applications and services, including asset management, configuration management database (CMDB), endpoint detection and response (EDR), extended detection and response (XDR), and vulnerability management.

Fusion for Incident Investigation Benefits At-a-Glance — Holistic view of all network activity across multi-cloud or hybrid network — Immediate value with 100% SaaS architecture that eliminates sensors, agents, taps, or probes — AI-powered analysis of contextualized VPC and VNet flow logs, on-prem flow logs, and DNS logs create high-fidelity, high-confidence alerts The Fusion platform transforms the metadata in your network from a table of IP addresses, ports, and protocols into enriched metadata that provides context-rich descriptions of the activities of your users, applications, and devices.

The result is that your teams will not have to access additional tools or engage with other teams to measure the scope of the event and understand the significance of the devices involved.

Unlock Your Fundamental Source of Truth

Fusion’s AI-powered detection engine identifies network activity your platform-native tools and legacy technologies miss. Fusion detects 10X more anomalies, compromises, and threats in your multi-cloud or hybrid network than your platform-native tools, SIEMs, or NDRs.

The Fusion platform contains over 300 customizable detection models that give your operations teams unmatched control over activity that should never happen in your network. They will respond faster to anomalies and compromises before that activity can disrupt operations, spike costs, or threaten business continuity.

Frictionless Architecture Deploys in Minutes

Most security operations centers (SOCs) lack visibility of all activity across their hybrid or multi-cloud networks, creating blind spots that emerge only during the incident investigation process.

The Fusion platform enables you to close blind spots before a crisis hits and you realize the critical historical data you need doesn’t exist. Fusion is cloud-native and its 100% SaaS, frictionless deployment model means you can monitor any segment or instance across your cloud and on-prem network at any time (including places you can’t or don’t want to deploy an appliance or agent, such as OT or IoT).

You’ll begin to visualize network activity almost immediately without the burden of sensors, agents, taps or probes. You get unmatched awareness from orchestrated and normalized flow and DNS data collected from your multi-cloud platforms as well as on-prem network.

About Netography

Netography is the fastest and easiest way to observe network activity across your multi-cloud or hybrid network. The Fusion platform identifies anomalous and malicious activity such as lateral movement and data exfiltration from ransomware, in real-time and at scale.

Netography provides security, cloud, and network operations teams with high-confidence actionable insights on unwanted activity that other tools miss without the burden of sensors, agents, taps, or probes.

The Fusion platform provides a holistic view of all network activity by observing and analyzing VPC flow logs, VNet flow logs, on-prem flow logs and DNS logs. It enriches the metadata it collects with dozens of context attributes from your tech stack to speed your understanding of the potential impact of any activity.