Unified Analytics for
Context-Rich Insights
Track network health (bandwidth, latency, packet loss) and device health (CPU, memory—temperature coming soon). Correlate it with security signals like logins, credential misuse, and lateral movement. Get cross-system, context-rich insights in minutes, not timelines stitched together across different portals.
SD-WAN Analytics
01
Data Logging Framework
Highly scalable, reliable, optimized, policy-driven data logging framework for all services
Highly scalable, reliable, optimized, policy-driven data logging framework for all services
Highly scalable, reliable, optimized, policy-driven data logging framework for all services
Multiple transports
Multiple transports
Multiple transports
Servers
Servers
Servers
Streaming of logs to one or more 3rd party collectors
Streaming of logs to one or more 3rd party collectors
Streaming of logs to one or more 3rd party collectors
02
Reports & Analytics
Real & historical time series log event reporting for various SD-WAN functions
Real & historical time series log event reporting for various SD-WAN functions
Real & historical time series log event reporting for various SD-WAN functions
Traffic usage/protocol anomaly detection through trend lines and confidence band
Traffic usage/protocol anomaly detection through trend lines and confidence band
Traffic usage/protocol anomaly detection through trend lines and confidence band
Prediction-based on extrapolation of trending data
Prediction-based on extrapolation of trending data
Prediction-based on extrapolation of trending data
Ad-hoc and scheduled reports
Ad-hoc and scheduled reports
Ad-hoc and scheduled reports
Predefined and custom report templates
Predefined and custom report templates
Predefined and custom report templates
Report export formats: csv, pdf, xls, email notification
Report export formats: csv, pdf, xls, email notification
Report export formats: csv, pdf, xls, email notification
03
Security Reports
Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection
Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection
Firewall reports per tenant: top rules, zones, source, destination by IP/domain name/geo location, ports, protocols, session duration, QoS, DDoS and Flood detection
Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput
Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput
Application reports: top L7 applications by risk, productivity, family and sub-families based on sessions, volume and throughput
Web traffic reports: top web traffic by URL categories and reputation
Web traffic reports: top web traffic by URL categories and reputation
Web traffic reports: top web traffic by URL categories and reputation
Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.
Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.
Threat profile reports: URL filtering and captive portal actions, IDS/IPS, anti-virus, SSL certificate anomalies, etc.
Forensics: packet capture for known/unknown applications and detected vulnerabilities
Forensics: packet capture for known/unknown applications and detected vulnerabilities
Forensics: packet capture for known/unknown applications and detected vulnerabilities
04
Search
Multi-column search with drilldown
Multi-column search with drilldown
Multi-column search with drilldown
Generic and custom queries
Generic and custom queries
Generic and custom queries
Correlation searches
Correlation searches
Correlation searches
05
Anomalies
Support of anomaly detection in traffic pattern/usage
Support of anomaly detection in traffic pattern/usage
Support of anomaly detection in traffic pattern/usage
Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)
Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)
Support for custom applications to detect anomalies and take actions (send traps, program policies, etc.)
06
GUI
Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)
Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)
Dashboard views for SD-WAN, security, vCPE functionality per tenant, per Customer VNF (Virtual Network Functions)
Visualization using charts, real-time views, maps, grids
Visualization using charts, real-time views, maps, grids
Visualization using charts, real-time views, maps, grids
Drilldown support to analyze data instantly for a given time range, detect trends and anomalies
Drilldown support to analyze data instantly for a given time range, detect trends and anomalies
Drilldown support to analyze data instantly for a given time range, detect trends and anomalies
Automatic data enrichment
Automatic data enrichment
Automatic data enrichment
Flexible reporting framework
Flexible reporting framework
Flexible reporting framework
07
Network Reports
Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit
Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit
Traffic reports per site: availability, bandwidth usage per access circuit, bandwidth usage per application, latency/loss, QoS per access circuit
Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites
Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites
Multi-site reports: connectivity, bandwidth usage and SLA metrics between sites
CGNAT reports: NAT events, pool utilization etc.
CGNAT reports: NAT events, pool utilization etc.
CGNAT reports: NAT events, pool utilization etc.
08
Management
Role-based access control + Command|API Access
Role-based access control + Command|API Access
Role-based access control + Command|API Access
Historical log archival and cleanup
Historical log archival and cleanup
Historical log archival and cleanup