How PXE Works
Taps into your threat library, keeps a vigilant eye out for any important threat identifiers, and alerts you immediately when it finds something. Like online identities to threats with complex Identity Analytics, and create an easily accessible comprehensive portfolio of your threat pool.
Ingest and store huge volumes of metadata from IP networks through sophisticated minimization and management techniques that reduce your storage footprint. Tailored to monitor, story, and ingest high rates of immutable structured traffic in a fraction of the space used to store source data, while still retaining easy and direct access to information.
Monitor any network up to 180G with hardware acceleration and application awareness. As applications become increasingly complex, large, and encrypted, the Sensor guarantees information won’t be lost as the system scales to intelligently monitor even the most multifaceted of networks.
Work with the same set of data as your team from anywhere with an Internet connection. Intellego Investigator combines your voice and data teams into a single, unified workspace, saving you critical time to find that needle in the haystack and keep your society safeguarded.
Built on open architecture and synthesizes with countless third party data sources and bases—including Syslog, XML, CSV, and more. Stay ahead of numerous data sources, encryption and blind channels, and gain access to otherwise inaccessible intelligence with Xcipio Integrator.
Built to support CALEA and ETSI standards, and fully customizable, able to fit into even the most complex infrastructure, the Xcipio Controller is scalable, flexible, and proven reliable. Employ a system that grows as you need it to, covering increasing bandwidth and number of targets. Regardless of network speed, you can still deliver communications insight without breakdowns or restrictions to your network.
PXE uses heuristic pattern matching techniques to classify traffic by inspecting flow content, which succeeds even if tunneling or obfuscation techniques are used.