
Network Security and ComplianceKentik
Monitor and investigate security incidents across all your networks with AI-driven anomaly detection and advanced compliance validation.
Vendor
Kentik
Company Website




Product details
Network Security and Compliance by Kentik is designed to monitor and investigate security incidents across all your networks. It leverages AI-driven anomaly detection to identify network-probing behavior, audit unusual internet traffic, and detect traffic to or from embargoed countries.
Features
- AI-Driven Anomaly Detection: Identify network-probing behavior and audit unusual internet traffic. Detect traffic to or from embargoed countries.
- DDoS Attack Detection: Quickly detect DDoS attacks with advanced detection algorithms. Minimize false positives and negatives with customizable attack profiles.
- Streamlined Attack Response: Mitigate attacks using your own infrastructure via RTBH/Flowspec. Integrate with providers like Cloudflare, Radware, and A10 for mitigation.
- Policy Compliance Validation: Identify and alert on rejected traffic anomalies. Verify RPKI enforcement and validate cloud ACLs.
- BGP Leak and Hijack Detection: Find BGP leaks and hijacks, test BGP reachability, and track BGP route changes.
- Malware Communication Identification: Alert in real time on blacklisted IPs and domains. Audit traffic to and from prohibited geographies and filter out VPC black holes.
- Full Fidelity Forensics: Understand historical data exfiltration/infiltration. Determine what accessed the network with security and business-enriched data. Identify users with ID-enriched flow data.
Benefits
- Enhanced Security: Quickly detect and mitigate security threats with AI-driven anomaly detection and advanced algorithms.
- Comprehensive Compliance: Ensure compliance with policy validation and real-time alerts on traffic anomalies.
- Efficient Attack Response: Streamline attack response with integration and mitigation capabilities.
- Proactive Threat Management: Identify and address potential threats before they impact your network.
- In-Depth Forensics: Gain insights into historical data breaches and network access with comprehensive forensic analysis.