• Over the last 2 years 49% of enterprises have suffered a successful malware or intrusion attack.
• 20% suffered 10 or more successful attacks.
• This does not include compliance requirements, insider threats and non-reported attacks.

This shows that despite > 80% of the investment being focused on protection and detection technologies, attacks occur consistently and successfully, from both external and internal sources, with days or months passing before they are identified, from ESG Research 2014.

Enterprises of all types are left needing immediate answers and with absolute confidence:

• How long has this attack been under way?
• What information and assets have been affected or compromised?
• When did this start, end, or is it still on-going?
• What is the Risk to the business due to this activity?

And these questions are not easily solved using conventional methods to retracing and reviewing network activity after a breach to determine the source, and trying to...
• Over the last 2 years 49% of enterprises have suffered a successful malware or intrusion attack.
• 20% suffered 10 or more successful attacks.
• This does not include compliance requirements, insider threats and non-reported attacks.

This shows that despite > 80% of the investment being focused on protection and detection technologies, attacks occur consistently and successfully, from both external and internal sources, with days or months passing before they are identified, from ESG Research 2014.

Enterprises of all types are left needing immediate answers and with absolute confidence:

• How long has this attack been under way?
• What information and assets have been affected or compromised?
• When did this start, end, or is it still on-going?
• What is the Risk to the business due to this activity?

And these questions are not easily solved using conventional methods to retracing and reviewing network activity after a breach to determine the source, and trying to detect abnormal or suspicious traffic in recorded data to avoid a potential breach.

Gartner and Forester both see the Network Forensics markets growing to approx $3b in 2018 and with a 26% CAGR - a reflection of increased security budgets and Board level interest in minimising Corporate Risk.

certaj aims to provide the forensic capabilities to provide the confidence in information and answers to the questions above.

certaj networks delivers the world’s only NCSI solution that scales seamlessly from 1 to 100 Gbps, from one location to global reach networks, and has been designed with full multi-user, multi-tenant as it's under pinning architecture. certaj delivers 100% accurate data collection and storage, but also delivers rich metadata and near real time responsiveness to queries and automatic reporting.

certaj delivers an on-demand risk based decision making capability integrating global threat intelligence, geographic lookup and identification, actual user activity reporting integrated with leading SIEM and other security systems through a scalable web based interface and API's.

With certaj working closely with and utilising current state of the art unique combination of software, hardware and hardware acceleration capabilities from 2015, we have the performance and economic model to retain the lead over competitive offerings, all of which are based upon 10 year old architecture – any change would come at a high cost and high risk to their businesses.
More information