Secure4D

The Next Generation of network visualizations

SecurusVisualizer
Recommend!
Evolved network visualization
What is connected to the in-house / campus / hospital / factory network? Network visualization is very important for information security.

How To Secure Your Network

What is SecurusVisualizer - Features Overview

1
Visualization of network!
2
Finding incident devices from F / W and UTM logs
3
Visualization of service ports
4
Visualization of vulnerability
5
Visualization of suspicious communication by honeypot function
6
Visualization of RTT with heat map
7
Visualization of connections with intelligent switches
8
Visualization of SYSLOG

Do you have any problems like this?

Are you struggling with these problems?
I want to know what is connected to the network
I want to know wheather there are unmanaged devices in the network
I want to know what is connected to which port of the Ethernet switch
I want to check wheather there is any suspicious communication such as port scan.
Is there any unnecessary services are running
I want to check network reachability

Main Feature

Impressive features
FunctionItem
Connected device detection
Unmanaged device detection
Unmanaged device automatic registration
Service port detection
Event notification (mail / SNMP Trap / SNMP Set / command dialogue)
Vlan Support
※option
Switch based map (snmp)
Vulnerability Diagnosis Report
Honeypot (port scan detection)
SYSLOG
Reachability monitoring (with heat map)
Web Browser Console
Cybersecurity - Secure Your Infrastructure

System overview

System configuration overview
Basic configuration example
2-segment configuration example
VLAN configuration example

Specification

Specifications
Cybersecurity - SecurusVisualizer - TX (Tiny Box Model)
SecurusVisualizer - TX (Tiny Box Model)
機能 項目
Ethernet
2 x Gigabit Ethernet on RJ45
Humidity
5% - 95% non-condensing
Commercial temperature
0°C to 45°C
Cooling
Fanless, passive cooling
Power Supplies 7V – 42V, up to 5A DC input
Physical Characteristics
132.8 mm X 100 mm X 34.8 mm
SecurusVisualizer - VM (Virtual Machine Model)
SecurusVisualizer - VM (Virtual Machine Model)
FeatureItem
Storage capacity (minimum / maximum)
128 GB / 2 TB
Number of virtual CPUs (minimum / maximum)
2 / 8
Ethernet
2 / 3

You may also be interested in

Cyber ​​security cooperation

Many security products provide API functions. We use these APIs to provide operation automation solutions for network devices. Please contact us.い.

Visualization of Cyber Security

Knowing the dangers lurking on the Intranetwork. It is important to know what devices are connected to the network in order to detect the danger lurking in the network.

Cyber Security Research

Various standardization activities are being carried out for cooperation between security products and network products around the world. We collaborate with research institutes such as universities to investigate trends in global standardization activities, investigate the latest information, and actually carry out research activities such as moving the reference implementation.