Providing clear, comprehensive reports on all firewall activity
NetInsightll
Security Reporting Center/FirewallSuite
By implementing NetInsight ll Security Reporting Center and Firewall Suite, organizations can visualize log files, efficiently detect unauthorized access such as attempts to reach prohibited ports, and enable a clear understanding of what is happening on your firewalls.
Features of NetInsight ll
-
Support for Over 40 Types of Firewalls and Proxies
NetInsight ll analyzes logs and generates reports for a wide range of firewalls and proxy servers, including Check Point, Juniper, FortiGate, Cisco PIX, and IPCOM.In recent years, in addition to log analysis for firewalls and proxies, it has also added support for logs generated by UTM functions (such as antivirus, web filtering, and anti-spam) on products including the IPCOM EX series and Check Point.
-
Easily create the reports you need
With simple operations, you can generate more than 200 predefined reports. Report formats can be selected from HTML, Word, and others, and can be customized to suit your specific use cases.
Organization can also filter traffic by specific IP addresses, users, protocols, time periods, and more. Conversely, you can remove particular information from a report. This allows you to create clear, purpose-specific log reports.Sample Reports Include:
・Critical events by external address
・Overview of remote management events
・External addresses that triggered firewall rules
・User-specific web usage statistics
・Top external email senders
・Top bandwidth consumers, etc.*Report items vary depending on the firewall logs being analyzed.
Product Lineup
System Requirements
| Licensing | Security Reporting Center | Firewall Suite |
|---|---|---|
| OS |
Applicable to the following 32-bit or 64-bit Japanese versions of the OS: |
Applicable to the following 32-bit or 64-bit Japanese versions of the OS: |
| CPU | Intel Xeon 2.0 GHz or higher | |
| Memory | 2 GB or more | |
| HDD | 100 GB or more free space | |
Supported Firewalls, UTM , and Proxies
| Firewalls, UTM, and Proxy Servers | Security Reporting Center | Firewall Suite | |
|---|---|---|---|
| Firewalls | Juniper NetScreen/SSG | ✔ | ✔ |
| Juniper SRX | ✔ | ||
| Check Point | ✔ | ✔ | |
| IPCOM EX | ✔ | ✔ | |
| FortiGate | ✔ | ✔ | |
| Cisco ASA | ✔ | ✔ | |
| WELF-Enabled Logging Devices | ✔ | ✔ | |
| UTM | Juniper NetScreen/SSG | ✔ | |
| Juniper SRX | ✔ | ||
| Check Point | ✔ | ||
| IPCOM EX | ✔ | ||
| Proxy | Squid-Enabled Logging Devices | ✔ | ✔ |
| W3C-Enabled Logging Devices | ✔ | ✔ | |
| NCSA-Enabled Logging Devices | ✔ | ✔ | |
Security Products
- Next-Generation Firewall
- Targeted Attack Protection
- Cloud Security / Virtualization
- Mobile / Endpoint Security
- Email Security
- Anti-Phishing
(Business Email Compromise Protection, etc.) - Application Security
- Server Security
- Sandbox
- Malware Sanitization
- Log Analysis
- Server Monitoring
- Encryption
- Security Policy
- Industrial Control System Security
- Connected Car Security
- WAAP
- Browser Security
- Cloud Backup
- SASE
- Vulnerability Management