cStor Series

The cStor series is a flexible, powerful set of physical/virtual appliances that enable network performance monitoring and security, data visibility, and real time monitoring for on-premises, virtual and cloud deployments. It achieves this through its high performance, lossless packet/flow capture and storage. cStor provides a range of data-intensive applications, with a unique cost model and maximum flexibility, enabling visibility you can trust.

cStor

cStor

cStor: On-Demand Forensic Intelligence

cStor enables you to:

  • Capture, retain and analyze network traffic as the source of truth for performance and security related investigations and audit-trails
  • Capture raw frames from the wire to disk without loss, with deep burst buffering supporting data rates from 1 to 40 GbE
  • Provide detailed flow/conversation statistics, with flow indices created and maintained through parsing Layer 2-4 headers
  • Run forensics analysis for security incidents and data breaches as an extended arm of security tools
  • Reduce mean-time-to-resolution for application, user, and network performance issues
  • Optimize for simultaneous packet capture and query and select outputs from charts, tables or raw PCAP records, with error and event overlays
  • Optimize network capture path from multiple ports with hardware time-stamping for precision and accuracy
  • Manage capability with start/stop capture per port, rotation of capture files and application of filters
  • Configure Syslog and SNMP alerts on frame errors, frame drops, microbursts, transceiver light levels and link statistics, with alert conditions and reporting

cStor-V: Virtual/Cloud based Forensics

cStor-V enables you to:

  • Capture, retain and analyze network traffic as the source of truth for performance and security related investigations and audit-trails
  • Capture raw frames from on-prem branch/data center virtual infrastructure and cloud to disk without loss
  • Provide detailed flow/conversation statistics, with flow indices created and maintained through parsing Layer 2-4 headers
  • Run forensics analysis for security incidents and data breaches as an extended arm of security tools
  • Reduce mean-time-to-resolution for application, user, and network performance issues
  • Optimize for simultaneous packet capture and query and select outputs from charts, tables or raw PCAP records, with error and event overlays
  • Optimize network capture path from multiple virtual ports with time-stamping for precision and accuracy
  • Manage capability with start/stop capture per virtual port, rotation of capture files and application of filters

Compliance:

Many industries, such as financial, healthcare and service providers have strict regulatory compliance guidelines for storing specific network traffic. cStor Forensic Storage arrays provide network operators the ability to easily store traffic and remain compliant.

Forensic Investigation

Tracking down intermittent problems across the entire network can be a challenge if there are multiple events occurring at once. The integration between cStor Forensic Storage arrays and the Intelligent Monitoring Fabric allows users to easily troubleshoot imminent issues by allowing a playback recording of past events.

Security Analysis

After a security incident has been identified and contained, InfoSec analysts need to understand the true nature of the threat. cStor simplifies this process by allowing the user to forensically search across L2-L7 to determine if that threat could compromise their security perimeter.

Compliance:

Many industries, such as financial, healthcare and service providers have strict regulatory compliance guidelines for storing specific network traffic. cStor Forensic Storage arrays provide network operators the ability to easily store traffic and remain compliant.

Forensic Investigation

Tracking down intermittent problems across the entire network can be a challenge if there are multiple events occurring at once. The integration between cStor Forensic Storage arrays and the Intelligent Monitoring Fabric allows users to easily troubleshoot imminent issues by allowing a playback recording of past events.

Security Analysis

After a security incident has been identified and contained, InfoSec analysts need to understand the true nature of the threat. cStor simplifies this process by allowing the user to forensically search across L2-L7 to determine if that threat could compromise their security perimeter.

cStor Resources

Additional Resources

Cloud/Hybrid Visibility with Amazon VPC Traffic Mirroring
Download
cPacket and Cisco NFVIS/ISRv Solution Brief
Download
Capture, Analyze, Replay the Network Data
Download
cPacket Products Quick Reference Guide
Download
Security Delivery and Incident Response Solution Brief
Download
Webinar: Network-as-a-Service for Security Delivery & Incident Response
Download

Join the Revolution

Schedule a free demo to see how cPacket solutions can change the way you monitor your network performance.