AMT Banner ADMINISTRATION SOFTWARE SITE MAP AMT SOFTWARE CONTACT AMT SOFTWARE PURCHASING FROM AMT SOFTWARE SEARCH AMT SOFTWARE SOFTWARE PRODUCTS LISTINGS AMT SOFTWARE HOME TOOLS AND UTILITY SOFTWARE DATA REPLICATION AND FAIL-OVER PRINT MANAGEMENT SOFTWARE NETWORK MANAGEMENT SOFTWARE EXCHANGE SERVER SOFTWARE SECURITY SOFTWARE DEPLOYMENT AND UPDATING SOFTWARE ACTIVE DIRECTORY SOFTWARE MANAGEMENT SOFTWARE FOR WINDOWS SERVERS BY AMT SOFTWARE

Iris

Iris™ The Network Traffic Analyzer

Iris is an advanced data and network traffic analyser, a "sniffer", that collects, stores, organizes and reports all data traffic on your network. Iris is revolutionary because it delivers never-before-available functionalities that make network administration easier than ever. Iris is the first network traffic analyser on the market, ingeniously designed to help IT personnel proactively monitor their organisations network. Unlike other network sniffers, Iris has advanced, integrated technology that allows it to reconstruct network traffic, all with a push of a button.

Using Iris, the network administrator can set up automated screens to monitor the Web-browsing patterns of their organisation's personnel to determine if company security or intellectual property is being compromised. The confidence Iris instills in an organisation's network security will ultimately lead to decreased network down-time and increased IT focus.

 

 

Iris' key features include

 

Packet Reconstruction
Iris will reconstruct Web-browsing sessions on an organization's local network, even simulating cookies for entry into password protected Web sites, thus capturing a clear and concise image of the integrity of an organization's network. click here for screen shot

 

Packet Manipulation/Forging
Iris allows users to create custom packets or spoof packets and send them across the Internet or their networks. This functionality can be used to test firewalls and ensure they are blocking and filtering packets correctly. You can also use Iris to test the load bearing capabilities of a system or server.

 

 

Screen Traffic by Key Criteria
With Iris you can monitor network traffic by setting numerous screening criteria. You can monitor and record network traffic based on a specific MAC address, IP address, keyword, port, protocol layer or hardware layer. click here for screen shot

 

 

Log Foreign Connection Attempts
Iris will capture the evidence of network intrusions, reconstructing every keystroke and movement an attacker has made, creating a complete log of any attempt to bring harm to your network. click here for screen shot

 

 

Decode Common Protocols
Unlike other network sniffers, Iris has advanced, integrated technology that allows it to reconstruct network traffic in a format that is simple to use and understand. click here for screen shot

 

Produce Executive Reports
With the release of Iris 2.0, eEye made analyzing your network even easier through the use of Iris' new graphing functionality. These graphs can be used to help administrators understand the happenings of their networks. They can also be used to generate reports detailing network activity for an organization's upper-level management.

 

Monitor Web-Based Email and Instant Messenger Services
Iris allows you to monitor non-encrypted Web-based email traffic and instant messages. This feature can greatly complement normal company-based email control, audit and monitoring procedures.

 

System Requirements
· Windows 95/98/NT/2000
· Internet Explorer 4.01 or higher
· comctl32.dll version 5.00 or higher
- Comctl32 update can be downloaded from this location.

Minimum system
Pentium 166, 32MB RAM, 1GB HDD

Recommended
Pentium 400, 128MB, 10 GB HDD

 

All trademarks are property of their respective owners or holders. Information subject to change without notice
Copyright © 2000 - 2015 AMT Software. All rights reserved.