Application Recognition and Control System

Existing network tools and security solutions are often difficult to use and understand, providing no further visibility besides basic user, communication port and host destination. Niometrics offers users a revolutionary way of understanding their networks, providing never-before insights into all application and user activity in extensive detail.

Realtime Network Monitoring & Visualization

Powerful Drill-down and Enforcement Dashboard

Niometrics ARCS comes with a modern web-based management interface, designed for interactivity. Leveraging on lightweight Javascript, powerful HTML5 visuals, and an intelligent network traffic indexing and searching backend, Niometrics ARCS makes it easy for IT administrators to navigate to the activity of interest and interact with the system to extract information or configure network policies. Users can instantly switch from the graphical dashboard to low-level logs, or to right-click policy enforcement configuration.

Comprehensive Reporting Tools

Niometrics ARCS periodically aggregates traffic data and produces high-level summaries on how network resources are being utilized. This includes high-volume applications, top bandwidth-consuming users, policy violations, most popular applications, high-level security assessments, as well as other host and session statistics. Reports are available through the Web-based management interface and can also be delivered by email to the IT manager in PDF format at scheduled intervals.

In addition to high-level reports, IT administrators can run custom queries based on time range, application, and user filters to produce statistical or graphical reports . For demanding users, Niometrics ARCS produces flow-level logs that can be downloaded and analyzed through C and Python bindings.

Easy Management

Network Monitoring

Key indicators are summarized in a simple real-time view, enabling the IT manager to do quick routine checks on network conditions and appliance status. Network status information presented includes traffic load, percentage of policy violations, number of active users, and detection rate. Anomalies in any of those measures would warrant a drill-down inspection. The IT manager can also observe appliance resource utilization as well as availability of updates on the same panel.