VSEC Vadar NSM

  1. VSEC VADAR NSM SOLUTION

VSEC Vadar Network Security Management ( brand as VSEC Vadar NSM ) is a network management system designed to detect and prevent harmful behaviors at the network layer. Additionally, it continuously monitors, collects, records, stores and conducts in-depth analysis to promptly identify suspicious activities within the system. 

     2.  KEY FEATURES

  • Provides an intuitive interface for monitoring, analyzing, and displaying metrics and essential data. Allows for the minimal setup of an administrative interface ( distinct from the monitoring interface).
  • Establishes and manages protection rule sets.
  • Utilizes encrypted protocols for remote administration, enabling automatic logout and termination of remote administration sessions upon session timeout
  • Exports reports from the system in PDF and Excel formats.
  • Configures network traffic control actions based on IP addresses or address ranges; activates/deactivates network traffic control actions currently applied to specific IP addresses or ranges.
  • Integrates and shares synchronized data with the VSEC Vadar SIEM system and other types of SIEM systems.
  • Ensures various system configurations, remote management configurations, rule set configurations, account configurations, IP address lists, log data, etc., are saved and remain unchanged in subsequent reboots due to unforeseen errors (excluding hardware faults).
  • Guarantees system time synchronization up to the current moment.
  • Stores and retrieves all logs, which will be standardized in JSON format.
  • Ensures the execution of information analysis on monitored network traffic in accordance with the priority processing order of protective rule sets, white IP address lists, and configured black IP address lists.
  • Supports network protocols such as IPv4 (RFC 791), IPv6 (RFC 2460), ICMPv4 (RFC 792), ICMPv6 (RFC 2463), TCP (RFC 793), and UDP (RFC 768) for network intrusion detection and prevention.
  • Analyzes information from packets within monitored network traffic.

3. SPECIAL ADVANTAGES

  • Simple and Covenient Usage : The interface is visually intuitive, simple to navigate, and user-friendly, featuring clear descriptions and easily understandable buttons for smooth operations
  • Automated Processes : All Network Security Management (ATTT) processes are automated, providing maximum support for operations, especially in cases where enterprises face limitations in IT manpower.
  • Cost Savings : Timely detection and alerting of threats help mitigate risks and minimize costs associated with remediation efforts.
  • Early Detection and Swift Response : Continuous 24/7 monitoring ensures timely identification and rapid response, minimizing potential damages in case of incidents.

Link pdf