1. Understanding the Product and the Terms

The User Interface
Note: We recommend using Google Chrome to access the user interface. The user interface of cognitix Threat Defender consists of two main areas: t...
Mon, 28 Oct, 2019 at 3:00 PM
Network Objects
Traditional network security in a company is implemented by segmenting the network into smaller parts with perimeters between them. The reason for this is m...
Tue, 29 Oct, 2019 at 10:51 AM
Internal and External Networks
Available in: Rules When creating network objects you need to define the network allocation. This means you have to decide if the new network object is ...
Mon, 7 Oct, 2019 at 11:39 AM
Event Tracking Tables
Event Tracking Tables (ETTs) are data buffers that store combinations of attributes. They track traffic properties in order to enable behavior-based corr...
Mon, 7 Oct, 2019 at 11:43 AM
Advanced Correlation
cognitix Threat Defender uses behavior-based correlation, also called inline real-time correlation or Advanced Correlation, to analyze traffic and correlate...
Wed, 30 Oct, 2019 at 10:47 AM
Analytics / Reporting
After successfully logging in to the cognitix Threat Defender, you see the Analytics dashboard. Four dashboards quickly provide an overview of what’s ...
Wed, 30 Oct, 2019 at 10:03 AM