1. Understand the Product and the Terms

User Interface
The implemented user interface is quite easy to understand and self-explanatory. See the following sections for some general information. The cognitix T...
Thu, 28 Jun, 2018 at 11:54 AM
Network Objects
Traditional network security in a company is implemented by segmenting the network into smaller parts with perimeters between them. The reason for this is m...
Tue, 19 Jun, 2018 at 11:11 AM
Internal and External Networks
Available in: Rules When creating network objects you need to define the network allocation. This means you have to decide if the new network object is p...
Wed, 6 Dec, 2017 at 5:05 PM
Event Tracking Table
An Event Tracking Table (ETT) is a data buffer. It can store combinations of attributes. Each entry in the table has an individual timeout. Event trackin...
Thu, 7 Dec, 2017 at 9:32 AM
Advanced Correlation
The cognitix Threat Defender usescbehavior-based correlation, also called inline real-time correlation or Advanced Correlation (AC), to protect your network...
Tue, 19 Jun, 2018 at 11:13 AM
Analytics / Reporting
After successfully logging in to the cognitix Threat Defender, you reach the Analytics dashboard. Using four predefined dashboards, you quickly get an...
Tue, 19 Jun, 2018 at 11:04 AM
Intrusion Prevention System (IPS)
Path: Security - Intrusion Prevention System The Threat Defender has an integrated intrusion prevention system (IPS) which carries out various network tra...
Thu, 7 Dec, 2017 at 2:32 PM