Observer Apex

Observer Apex offers end-user experience scoring with seamless integration to GigaFlow enriched records and GigaStor transaction details to help IT teams achieve optimal service delivery.

Observer Apex provides unified visibility of network and IT infrastructure for NetOps and SecOps teams through a combination of end-user experience scoring performance monitoring, active defense, and in-depth post-event awareness into every network conversation and transaction.

As the centralized jumping-off point for troubleshooting, managing network resources, and aiding investigations of incidents of concern (IoC) or confirmed security breaches, Apex uniquely combines high-fidelity wire data, device, host, infrastructure, and user information into a single coherent view to quickly isolate aberrant activity or solve service issues. Knowing unconditionally who is talking on the network and what they are saying has never been so easy.

Apex delivers an out-of-box experience like no other network performance monitoring and diagnostics (NPMD) solution or security solution on the market.

Features and Benefits Summary

  • User-defined dashboards enable integrated, enterprise-wide situational awareness into service delivery health and security posture
  • Threat map offers real-time insight into current security attack vectors active against IT resources with integrated workflows
  • End-user experience scoring analytics with domain level root cause detail accelerates service troubleshooting at the individual transaction or site level
  • On-demand application dependency mapping delivers comprehensive multi-tier application understanding
  • Intelligent analysis and long-term retention of high-fidelity data facilitates forensic investigations  
  • Industry first synthesis of user, device, host, and infrastructure information into a single record linked to wire data enables advanced profiling and empowers IT team threat hunting

Additional resources:

End-User Experience Scoring

Machine learning powered end-user experience scoring for every network transaction with intelligently rolled-up values at the dashboard site level. Scores are color-coded and range from 0 (worst experience) to 10 (best experience) with corresponding problem domain highlighted. Integrated with out-of-the-box workflows and site-based views, the scoring empowers engineers to quickly identify, prioritize, and solve service issues.


Threat Map with Security Workflows

Integrated threat map offers IT teams global, real-time visibility into the current security risk vectors that are potentially impacting IT resources and users. IT teams can quickly gain situational awareness and initiate rapid response actions with targeted workflows or hunting efforts based on severity assessments.


Site Dashboards and Workflows

Geolocation-based dashboards provide global intelligence of IT service health at the regional, country, city, or data center levels, with even more granularity to individual service groups such as accounting. When combined with end user experience scoring, IT teams can gain instant world-wide situational awareness of all resources and then, when required quickly drill down to an individual user for rapid problem resolution.


On-Demand Multi-Tier Application Intelligence

On-demand application dependency mapping offers fast discovery of app interdependencies. Maps are built automatically to display complex relationships with simple clarity. This allows users to determine worst connections, app tiers, and network delay threshold deviations, while sorting all connections by status; critical, marginal, and acceptable.


Host/Device Traffic Profiling

Define groups of critical or at-risk assets like point-of-sale or ATMs; then gain instant visibility via alerts when exception activities or sessions not defined in white list rules are detected on these existing or new devices


Threat Hunting

Breaches are a given in today’s IT, passive defense strategies like firewalls, IDS/IPS, and SIEMs are necessary but no longer enough to protect critical resources—especially the organization’s crown jewels. IT teams need active defense capabilities like threat hunting to easily perform investigations of potential adversaries that have already gained access anywhere in the environment—real-time or post-event. Comprehensive detection of suspicious north/south or east/west traffic ensures rapid containment and then elimination of the threat.


Threat Map with Security Workflows

Integrated threat map offers IT teams global, real-time visibility into the current security risk vectors that are potentially impacting IT resources and users. IT teams can quickly gain situational awareness and initiate rapid response actions with targeted workflows or hunting efforts based on severity assessments.


Host/Device Traffic Profiling

Define groups of critical or at-risk assets like point-of-sale or ATMs; then gain instant visibility via alerts when exception activities or sessions not defined in white list rules are detected on these existing or new devices.


Threat Hunting

Breaches are a given in today’s IT, passive defense strategies like firewalls, IDS/IPS, and SIEMs are necessary but no longer enough to protect critical resources—especially the organization’s crown jewels. IT teams need active defense capabilities like threat hunting to easily perform investigations of potential adversaries that have already gained access anywhere in the environment—real-time or post-event. Comprehensive detection of suspicious north/south or east/west traffic ensures rapid containment and then elimination of the threat.


Apex collects and aggregates data from GigaStor and GigaFlow to achieve enterprise-wide performance and security visibility for NetOps and SecOps teams. By intelligently combining GigaStor network conversation information and enriched flow records from GigaFlow, Apex delivers centralized management of end-user experience, performance, and security intelligence.

Integration into Observer

As the centralizing reporting point for Observer, Apex provides flexible, customizable real-time dashboards and long-term historical reporting from aggregated wire data collected in GigaStor and GigaFlow. Beginning at a dashboard, users can review IT health and as required troubleshoot problems.

Deployment Considerations:

  • Deploy Apex in locations that maximize the opportunity to simplify connectivity with support components
  • Monitoring instrumentation points depend on network size, configuration, and visibility requirements
  • Utilize redundant Apex capabilities with two duplicate systems; a primary and a secondary for automated replication, facilitating redundancy

Observer Apex can be deployed as a standalone hardware appliance or software version. As the centralized reporting and troubleshooting launch point of Observer, Apex makes accessing GigaFlow enriched flow records or GigaStor traffic capture simple. Please refer to the following link for technical details.

If you are installing Apex on your own hardware or a virtual machine, please see the following link for minimum, recommended, and optimal system requirements.

有了 Observer 平台,最大好处是能够较快获得专家分析。捕获在持续运行,因此我们可以随时分析,而不必安装额外设备。

Landrin Long
,
内华达州信息技术部

提供的选件和产品功能令人惊叹。我们使用 Observer 解决问题的速度比我们拥有的任何其他分析软件都快。

Landrin Long
,
内华达州信息技术部

我发现 Observer 平台在诊断应用程序和网络问题方面是非常宝贵的工具。

Peter Young 网络管理员
,
内政部英国部长级部门

如何开始

对产品演示感兴趣? 请与我们联系以了解详细信息、获取报价或者了解如何购买。