According to Gartner, organizations spent $145 million on network forensics last year, driven by the need to not just stop cyber criminals, but to learn when and where they succeeded. In this era of advanced persistent threats and laser-focused phishing, IPS and SIEM defenses are more essential than ever but still insufficient. When traditional defenses […]
According to Gartner, organizations spent $145 million on network forensics last year, driven by the need to not just stop cyber criminals, but to learn when and where they succeeded. In this era of advanced persistent threats and laser-focused phishing, IPS and SIEM defenses are more essential than ever but still insufficient. When traditional defenses are inevitably breached, is your organization ready to react?
Network Forensics Appliances narrow this gap by delivering situational awareness and incident preparedness. Like a network DVR, these passive systems record and catalog every single bit that enters or exits a link. By delivering speedy-but-exhaustive full-packet replay, analysis and visualization, Network Forensics Appliances support cybercrime investigation, evidence gathering, impact assessment and clean-up.
In this buyer’s guide, we examine the capabilities and features offered by Network Forensics Appliances. Although the specific needs of each organization differ, we look at questions that every buyer should ask when choosing advanced network infrastructure to enable forensic analysis.
During and after a suspicious event, digital forensics may be used to gather and examine evidence, providing insight into precisely what happened: where an incident originated, which systems may have been touched, what data may have been extracted and so on. In the wake of a costly breach, forensics experts may be called in, bringing both computer and network forensic tools with them. Gartner estimates that 70 percent of enterprises rely on third-party services to handle infrequent incidents that require forensic expertise.
But even experts are limited by available data. Sifting through firewall and IPS and server logs can take investigators only so far. By definition, some traffic associated with each breach slipped through those defenses. Without a comprehensive record of network activity, it is hard to determine the true duration of a break-in or the extent of its damage. Even when forensic programs were installed on servers to log all system activity, some traffic sent by hacked or unmanaged devices is likely to have escaped detection.
Organizations that are risk-averse or frequent targets of high-stakes cybercrime – such as financial services – are most likely to invest in Network Forensics Appliances. Just as a storefront that is often robbed or can’t afford theft might install surveillance cameras, organizations that require complete cyber threat visibility can install Network Forensics Appliances. In fact, market analysts expect recent escalation in attack frequency and impact to stimulate Network Forensics Appliance sales.
Network Forensics Appliances have been around for a decade, deployed largely by high-security facilities (e.g., government). But changes to the threat landscape and products are now combining to spur enterprise interest and investment.
According to Nemertes Research, point-products are no long sufficient to protect today’s perimeter-less, virtualized, distributed, multi-application and multi-device environment. “As the economy has shifted online, the primary motive of attackers has changed from seeking to showcase technical skills to economic gain with theft of identities and intellectual property,” wrote analyst Johna Til Johnson. “Security technology is improving at an evolutionary pace, while threats are increasing at a revolutionary pace.”
As a result, Nemertes advises security teams to pursue more comprehensive threat protection: “Comprehensive in both scope (type and variety) and in time (starting even before a threat has been detected,” wrote Johnson. “Network forensics tools provide a natural starting point for this comprehensive functionality, as they serve to tie together data from all these products.”
Network forensics tools that have expanded beyond their capture-and-store roots by integrating near-real-time capabilities have grown more powerful. “Merely analyzing packets doesn’t convey effective insight into an attacker’s strategy. The ultimate goal is to provide a comprehensive solution that paints the full source and scope of an attack, outlines prevention techniques and automates prevention in real time,” she wrote.
Finally, technology improvements must be accompanied by human evolution. “It’s no longer sufficient for a security team to provide [breach details] to colleagues and senior management,” concluded Johnson. “The team must be prepared to translate the impact into business terms and risks.” To this end, Network Forensics Appliances now often support applications designed to rapidly deliver actionable insight to HR, law enforcement, compliance officers and other users in addition to forensic experts.
Finding an appliance that fits
Organizations interested in network forensics should begin with expected use cases. Gartner sees four primary uses among its clients:
Determining which use-cases are important to your organization can help justify acquisition and prioritize requirements. An organization focused on incident analysis may care little about canned compliance reports, while one driven by situational awareness may demand integration with specific SIEM. And so on.
Given benefits you expect a Network Forensics Appliance to bring to your organization, it’s time to identify required capabilities and features.
These are just some of the many features and capabilities currently found in Network Forensics Appliances. Vendors in this market include AccessData, Narus, NetScout, Network Instruments, NIKSUN, Solera Networks, RSA and WildPackets. To more fully illustrate this category over the coming weeks, EnterpriseNetworkingPlanet will profile Solera Networks‘ DS Appliances, RSA‘s NetWitness, and NIKSUN‘s NetDetector.
Lisa Phifer owns Core Competence, a consulting firm focused on business use of emerging network and security technologies. With over 25 years in the network industry, Lisa has reviewed, deployed, and tested network security products for nearly a decade.
Enterprise Networking Planet aims to educate and assist IT administrators in building strong network infrastructures for their enterprise companies. Enterprise Networking Planet contributors write about relevant and useful topics on the cutting edge of enterprise networking based on years of personal experience in the field.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.