{"id":1825,"date":"2025-02-07T10:42:31","date_gmt":"2025-02-07T10:42:31","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=1825"},"modified":"2025-02-07T10:42:31","modified_gmt":"2025-02-07T10:42:31","slug":"fidelis-network-for-amazon-vpc-traffic-mirroring","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=1825","title":{"rendered":"Fidelis Network\u00ae for Amazon VPC Traffic Mirroring"},"content":{"rendered":"<div class=\"elementor elementor-35153\">\n<div class=\"elementor-element elementor-element-7220915 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-2ace012 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Over the last decade, cloud computing has become the backbone of modern business, transforming how organizations operate and scale.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Companies rely heavily on cloud services, with most of their applications and workloads migrating to efficient platforms like AWS due to the increased remote working requirements and demand for scalable, flexible, and cost-effective solutions that support business continuity and growth.<\/span><span>\u00a0<\/span><\/p>\n<p><span>In this cloud setup, Amazon Virtual Private Cloud (VPC) enables businesses to create private network environments, giving them control over network setup, traffic management, and connections to on-site systems.<\/span><span>\u00a0<\/span><\/p>\n<p><span>However, monitoring and securing the traffic within these environments can be challenging.<\/span><\/p>\n<p><span>Why is that?<\/span><span>\u00a0<\/span><\/p>\n<p><span>Monitoring, analyzing, and securing such complex environments is difficult because so much data flows to and from the cloud, as well as internally, including sensitive information. This makes the cloud, i.e., the VPCs, one of the prime targets for attacks.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>This is where we need to consider cloud network traffic analysis, including traffic mirroring, and advanced security monitoring strategies.<\/span><span>\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e3af6b2 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-47b5c0a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What is Cloud Network Traffic Analysis?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7f6509b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Cloud <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/network-traffic-pattern-analysis\/\">network traffic<\/a> analysis is significant and a must-have practice for organizations to identify and address security threats, prevent data loss, and ensure the smooth flow of cloud network traffic.<\/span><span>\u00a0<\/span><\/p>\n<p><span>As more organizations adopt Infrastructure-as-a-Service (IaaS) solutions like virtual machines (VMs), effective monitoring of cloud network traffic becomes even more crucial to protect data, optimize operations, and ensure smooth workflow.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4433e8f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Why Cloud Network Traffic Analysis Is Critical:<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bb82710 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Helps identify unusual patterns and anomalies (<a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/anomaly-detection\/\">read more<\/a>), detect threats, and prevent data breaches.\u00a0<\/span><span>\u00a0<\/span><span>Helps organizations comply with regulatory requirements and protect sensitive data.<\/span><span>\u00a0<\/span><span>Helps detect network bottlenecks and performance issues to improve user experience.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1739dbd elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">How Does Cloud Network Traffic Analysis Work?<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-510355f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW23248174 BCX8\">Network traffic analysis can be <\/span><span class=\"NormalTextRun SCXW23248174 BCX8\">implemented<\/span><span class=\"NormalTextRun SCXW23248174 BCX8\"> using several techniques for capturing network traffic and <\/span><span class=\"NormalTextRun SCXW23248174 BCX8\">analyzing<\/span><span class=\"NormalTextRun SCXW23248174 BCX8\"> data flow. Two common methods are:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b091dbe elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Packet Capture and Inspection:<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-978326e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Intercepts and inspects network packets in real-time.<\/span><span>\u00a0<\/span><span>Provides detailed network visibility into the data flow, helping identify security issues.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7b589c7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pros: Granular insight into network traffic.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cons: It can be resource-heavy and slow down the network if not managed properly. <\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-072545b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Flow Analysis:<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0acaefe elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW234198263 BCX8\"><span class=\"NormalTextRun SCXW234198263 BCX8\">Focuses on metadata (e.g., IP addresses, ports) to track traffic patterns.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6d61464 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Pros: Less resource-intensive, ideal for large environments.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cons: Provides less detailed visibility than packet inspection.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9a2cf0c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Challenges of cloud network traffic analysis are: <\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-84342f4 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Cloud environments handle a large amount of data, making it hard to capture and analyze every piece of traffic effectively.<\/span><span>\u00a0<\/span><span>Cloud networks are constantly changing (services spin up and down based on demand), making it difficult for traditional monitoring tools to keep up with these rapid changes.<\/span><span>\u00a0<\/span>\n<p><span>To overcome these challenges, organizations should consider robust tools and methods like Netgate TNSR, Fidelis Network Sensors and VPC traffic mirroring to capture both inbound and outbound traffic via Elastic Network Interfaces (ENIs) and analyze it using advanced methodologies such as Deep Session Inspection and other techniques.<\/span><span>\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1aeb9f1 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-d49bc16 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">AWS VPC Traffic Analysis with Netgate TNSR &amp; Fidelis Network\u00ae<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-13f3a1b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span class=\"NormalTextRun SCXW256286600 BCX8\">Here is the complete flow of how AWS VPC network traffic analysis works with <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW256286600 BCX8\">Netgate<\/span><span class=\"NormalTextRun SCXW256286600 BCX8\"> TNSR and Fidelis Network\u00ae:<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2db5188 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a5fe54a e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-ab1c8c9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Can Deep Traffic Analysis Strengthen AWS Security?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0574561 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW31033509 BCX8\">Uncover how leading organizations are <\/span><span class=\"NormalTextRun SCXW31033509 BCX8\">leveraging<\/span><span class=\"NormalTextRun SCXW31033509 BCX8\"> advanced network traffic analysis to:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e254909 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Extend visibility to AWS cloud applications, workloads, and databases<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Simplify network traffic mirroring with no third-party agents required<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analyze all ports and protocols without data loss or sampling<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a6fbba8 elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/amazon-web-services\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download the Datasheet<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ef3bc9b e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-abb1431 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW234917792 BCX8\"><span class=\"NormalTextRun SCXW234917792 BCX8\">Now, <\/span><span class=\"NormalTextRun SCXW234917792 BCX8\">let\u2019s<\/span><span class=\"NormalTextRun SCXW234917792 BCX8\"> go through the process in detail.<\/span><\/span><span class=\"EOP SCXW234917792 BCX8\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9395d5a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-c7c0dbf elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">VPC Traffic Mirroring in AWS with Netgate TNSR <\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-94be018 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">What is AWS VPC Traffic Mirroring?<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6cf57e7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW82875298 BCX8\">VPC <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-traffic-mirroring\/\">traffic mirroring<\/a> works in AWS by allowing companies to capture and <\/span><span class=\"NormalTextRun SCXW82875298 BCX8\">analyze<\/span><span class=\"NormalTextRun SCXW82875298 BCX8\"> network traffic from their Virtual Private Cloud (VPC). This gives them a detailed view of traffic for monitoring and troubleshooting. <\/span><span class=\"NormalTextRun SCXW82875298 BCX8\">Essentially, it<\/span><span class=\"NormalTextRun SCXW82875298 BCX8\"> helps copy network traffic and sends it to a monitoring tool for analysis.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d837b44 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Netgate TNSR: Overview<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-633580b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW47605527 BCX8\"><span class=\"NormalTextRun SpellingErrorV2Themed SpellingErrorHighlight SCXW47605527 BCX8\">Netgate<\/span><span class=\"NormalTextRun SCXW47605527 BCX8\"> TNSR is an advanced, open-source platform designed to manage and route network traffic in a highly secure, scalable, and flexible way. It provides real-time traffic mirroring, network load balancer functionality, and analysis capabilities, enabling organizations to <\/span><span class=\"NormalTextRun SCXW47605527 BCX8\">monitor<\/span><span class=\"NormalTextRun SCXW47605527 BCX8\"> network data without interrupting the flow of traffic.<\/span> <span class=\"NormalTextRun SCXW47605527 BCX8\">Amazon EC2 can be used to host the <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW47605527 BCX8\">Netgate<\/span><span class=\"NormalTextRun SCXW47605527 BCX8\"> TNSR solution, which is capable of handling high-speed network traffic.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b3f5c59 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">How Netgate TNSR Works with AWS VPC Traffic Mirroring<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6a6ded7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Netgate TNSR works within AWS to monitor traffic for suspicious activities in near real-time, acting as a network mirror that sends high-speed traffic directly to any cloud-based traffic analysis engine, such as Fidelis Network\u00ae.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Other key aspects of Netgate TNSR include:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bbb6b2e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Intelligent Routing: Netgate TNSR is capable of intelligently routing traffic between different applications, VPCs, and secure VPN links. Whether handling traffic within the same VPC (east-west) or between multiple VPCs (north-south), it ensures that network traffic is mirrored without performance degradation.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automation and Flexibility: The integration offers automated network management through TNSR API. This allows IT teams to effortlessly add or modify network connections between VPCs or adjust traffic parameters without the need for manual reconfiguration, enhancing operational efficiency.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Scalability and Performance: From speeds of 1Gbps to over 100Gbps, Netgate TNSR provides the flexibility to scale as traffic demands increase, allowing organizations to monitor high-volume cloud environments without compromising performance.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d3a7f8e elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Mirroring Process with Netgate TNSR<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0fc4595 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>A traffic mirror session by Netgate TNSR handles the copying of packets from the traffic mirror source (where the traffic originates) to the traffic mirror target (usually a tool like Fidelis Network\u00ae), allowing deep analysis without disrupting the original traffic.\u00a0<\/span><span>\u00a0<\/span><\/p>\n<p><span>A Gateway Load Balancer can also be employed to distribute traffic more effectively across multiple virtual appliances during the mirroring process, ensuring scalability and improved performance in traffic analysis.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Additionally, <a href=\"https:\/\/fidelissecurity.com\/cybersecurity-101\/learn\/what-is-traffic-mirroring\/\">traffic mirror<\/a> resources, such as a traffic mirror filter, help determine which specific traffic should be copied and sent to your monitoring tool for analysis. This enables you to monitor performance without dealing with unnecessary data. The Instance Metadata Service (IMDS) can also provide specific information about the instance, offering deeper insights for your analysis.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cecaf82 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-95b340a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Sending Mirrored Traffic from Netgate TNSR to Fidelis Network\u00ae <\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0ed28ea elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Using GRE Tunnels:<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e807e4e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Netgate TNSR sends the mirrored traffic to Fidelis Network\u00ae which is within its own VPC using GRE (Generic Routing Encapsulation) tunnels.<\/span><span>\u00a0<\/span><\/p>\n<p>GRE tunnels encapsulate data packets, allowing them to be transmitted over networks that don\u2019t support the original protocol. This process ensures secure, uninterrupted delivery to Fidelis Network\u00ae for further analysis. This process involves wrapping the data in a new packet header, which is removed at the receiving end, revealing the original data.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a2d6344 elementor-widget elementor-widget-image\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3c6f926 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW183014680 BCX8\"><span class=\"NormalTextRun SCXW183014680 BCX8\">Once the mirrored traffic reaches <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">Fidelis Network<\/a>\u00ae, what happens <\/span><span class=\"NormalTextRun SCXW183014680 BCX8\">next<\/span><span class=\"NormalTextRun SCXW183014680 BCX8\">?<\/span><\/span><span class=\"EOP SCXW183014680 BCX8\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6866c18 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-054864a elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Cloud Network Traffic Analysis with Fidelis Network\u00ae<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-426dc39 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">What is Fidelis Network\u00ae?<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0f78fb3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Fidelis Network\u00ae is a powerful security tool that protects against network threats both in the cloud and on-premises. Unlike traditional tools like firewalls and antivirus, it constantly monitors and analyzes network traffic in real-time to spot unusual activity and potential threats. Using advanced analytics and machine learning, it can detect threats within the network that other tools might miss, offering deep visibility across all ports and protocols.<\/span><span>\u00a0<\/span><\/p>\n<p><span>It also features automated response technologies such as:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-90acfd4 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Network Data Loss Prevention<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Sandboxing<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deep Session Inspection<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Advanced Cyber Terrain Mapping<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f5886a5 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW37065831 BCX8\"><span class=\"NormalTextRun SCXW37065831 BCX8\">These capabilities make it a crucial addition to an organization\u2019s security infrastructure for proactive, real-time threat detection and response.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8730646 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">Enhanced Cloud Traffic Monitoring with Fidelis Network\u00ae<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-28f951e elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Once the mirrored traffic reaches <a href=\"https:\/\/fidelissecurity.com\/fidelis-elevate-extended-detection-and-response-xdr-platform\/\">Fidelis Network<\/a>\u00ae, it utilizes its powerful <a href=\"https:\/\/fidelissecurity.com\/resource\/whitepaper\/overcoming-detection-gaps-deep-packet-inspection\/\">Deep Session Inspection (DSI) technology<\/a>, along with other features, to provide a comprehensive analysis of cloud traffic. It goes beyond typical network monitoring to detect suspicious activity, potential breaches, and data loss, both in real-time and retrospectively.<\/span><span>\u00a0<\/span><\/p>\n<p><strong>Key cloud traffic monitoring features include:<\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6149854 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Deep Session Inspection (DSI): Provides granular visibility into cloud network traffic, analyzing not just packet headers but also session details, file content, and obfuscated files.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cross-Session and Multi-Faceted Analysis: This approach gives deeper insights into network behavior and potential threats by analyzing multiple sessions at once. It uses advanced machine learning to detect anomalies and spot unusual patterns that may indicate malicious activity.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Metadata and Custom Tags: Tags and stores hundreds of metadata attributes related to network traffic, offering deep context that traditional firewalls or SIEMs (Security Information and Event Management systems) might miss. This data can be retained for up to 360 days, providing long-term visibility and historical analysis capabilities. <\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Scalable Capacity: Capable of analyzing up to 2Gbps of traffic without packet loss, ensuring no important data is overlooked. It also supports multi-sensor configurations to handle large-scale networks.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Comprehensive Threat Detection: Offers proactive threat intelligence derived from research teams and various external threat intelligence feeds. This enables security teams to stay ahead of evolving threats and respond rapidly.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ce5228a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-bef95b7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2189f8a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW29409283 BCX8\">Protecting AWS VPCs is a critical security priority to ensure the health of your organization\u2019s overall cloud and network infrastructure. Traditional cloud network analysis has many limitations that are ineffective in today\u2019s advanced cloud and network environments. To protect your AWS VPC and ensure real-time threat detection in the cloud network, integrating tools like <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW29409283 BCX8\">Netgate<\/span><span class=\"NormalTextRun SCXW29409283 BCX8\"> TNSR and Fidelis Network\u00ae <a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">NDR<\/a> is essential.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/network-security\/amazon-vpc-traffic-mirroring\/\">Fidelis Network\u00ae for Amazon VPC Traffic Mirroring<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Over the last decade, cloud computing has become the backbone of modern business, transforming how organizations operate and scale.\u00a0 Companies rely heavily on cloud services, with most of their applications and workloads migrating to efficient platforms like AWS due to the increased remote working requirements and demand for scalable, flexible, and cost-effective solutions that support [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":1826,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1825"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1825"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/1825\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/1826"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}