1. Understanding the Product and the Terms

The User Interface
Note: We recommend using Google Chrome to access the user interface. The user interface of cognitix Threat Defender consists of two main areas: t...
Fri, 2 Jul, 2021 at 11:33 AM
Network Objects
Traditional network security in a company is implemented by segmenting the network into smaller parts with perimeters between them. The reason for this is m...
Fri, 2 Jul, 2021 at 11:35 AM
Internal and External Networks
Available in: Policy > Network Objects When creating network objects you need to define their network allocation by assigning them to the Internal or ...
Fri, 2 Jul, 2021 at 11:37 AM
Event Tracking Tables
Event Tracking Tables (ETTs) are data buffers that store combinations of attributes. They track traffic properties in order to enable behavior-based corr...
Mon, 7 Oct, 2019 at 11:43 AM
Advanced Correlation
cognitix Threat Defender uses behavior-based correlation, also called inline real-time correlation or Advanced Correlation, to analyze traffic and correlate...
Fri, 2 Jul, 2021 at 11:42 AM
Analytics / Reporting
After successfully logging in to the cognitix Threat Defender, you see the Analytics dashboard. Three dashboards quickly provide an overview of what’s...
Wed, 11 Dec, 2019 at 4:35 PM