Jammer

A modern High Interaction Threat Detection system.



Detect.
Analyze.
React.
Protect.

Jammer is a High Interaction Threat detection system, which will improve the level of security of your enterprise network via the following phases:​

Detect

Jammer detects in real time all the connections incoming towards your network, creating configurable isolated environments where the attacker activity is redirected and saved.​

Analyze

Jammer provides all the instrumentation to analyze sessions' specifics via a modern web UI, both for live inspection and post-analysis. Sessions can be tagged, searched, logs can be downloaded and processed offline. ​

React

To lively improve the level of security of your infrastructure, Jammer provides APIs that can be integrated in your tooling to promptly react on new emerging threats.​

Protect

Via this set of instrumentation, your infrastructure will automatically improve its level of security, and analysts are provided with all the instrumentation needed to analyze and implement custom security measures.​

Why use Jammer

There are many ways in which Jammer can help your organization grow, be safe, improve its security levels.

Jammer generated data comes in world-standard formats, such as CSV, PCAP and JSON API. Such data can be used to create, store and host a custom threat intelligence database.​
Jammer live activity and monitoring systems can be used to automatically configure and interact with firewall systems already present in your infrastructure.​
Via its set of instrumentation, Jammer can be easily used as a laboratory to train and prepare analysts against real threats and attack scenarios.​
Jammer tracks attackers' sessions live. Its Web UI automatically shows newcoming attacks, related geolocations, sessions, and real time logs.
Home dashboard

All your data collected in one place

All data collected by Jammer is shown in real time.
Check how your organization is attacked, from where, in which way.

Live monitoring

Monitor your infrastructure live

Jammer provides real-time information related to real-time attacks.
Check in real-time from where the attacks are coming, and what activities they're conducting.

Search engine

Search for past data and sessions

Jammer stores and saves all data related to the attacks in a structured way.
Via UI and APIs, you'll be able to query all data collected by the Jammer installation.

Post-analysis engine

Act post-attack actions thanks to the routines engine

With its routines engine, Jammer provides instrumentation to perform post-analysis activities.
Process past attacks, tag attacks, prepare and output rich templates, enrich IDS/IPS systems.

shape

More information?

Download a comprehensive Jammer presentation by clicking on this link.

Need a demo?

Please contact us at info@infinitaware.com