1. Understanding the Product and the Terms

The User Interface
Note: We recommend using Google Chrome to access the user interface. The user interface of cognitix Threat Defender consists of two main areas: t...
Wed, 11 Dec, 2019 at 3:34 PM
Network Objects
Traditional network security in a company is implemented by segmenting the network into smaller parts with perimeters between them. The reason for this is m...
Tue, 29 Oct, 2019 at 10:51 AM
Internal and External Networks
Available in: Policy > Network Objects When creating network objects you need to define their network allocation by assigning them to the Internal or ...
Wed, 11 Dec, 2019 at 2:48 PM
Event Tracking Tables
Event Tracking Tables (ETTs) are data buffers that store combinations of attributes. They track traffic properties in order to enable behavior-based corr...
Mon, 7 Oct, 2019 at 11:43 AM
Advanced Correlation
cognitix Threat Defender uses behavior-based correlation, also called inline real-time correlation or Advanced Correlation, to analyze traffic and correlate...
Wed, 30 Oct, 2019 at 10:47 AM
Analytics / Reporting
After successfully logging in to the cognitix Threat Defender, you see the Analytics dashboard. Three dashboards quickly provide an overview of what’s...
Wed, 11 Dec, 2019 at 4:35 PM