NetResident is a network content analysis application designed to monitor, store, and reconstruct a wide range of network events and activities, such as e-mail messages, Web pages, downloaded files, instant messages, and VoIP conversations. NetResident uses advanced monitoring technology to capture the data on the network, saves the data to a database, reconstructs it, and displays the content in an easy-to-understand format.
NetResident helps organizations protect sensitive information and enforce security policies as well as adhere to government and industry information protection regulations by providing event-based network visibility and data leak detection and reducing the risks associated with uncontrolled information flow.
- In-depth, real-time view of network traffic and storage of data in a database
- Deep packet inspection: state-of-the-art technology for searching, identifying, and reconstructing many protocols and data types: HTTP, POP3, SMTP, FTP, News, VoIP (SIP, H.323), IM (MSN, Yahoo, ICQ, etc.), Web Mail (Gmail, Hotmail, etc.), Telnet
- Customizable alerts: pop-ups, e-mail notifications, SNMP traps, to name a few
- Fast search of the captured content
- Log file import in many popular formats for post-capture forensic analysis: PCAP, CommView, etc.
- Easy to use and deploy
How It Works
NetResident is a software product that can be easily deployed by the organization's IT staff. Typically, it runs on a dedicated computer connected to the LAN's segment monitoring port (or stand-alone PC, if used for processing log files for post-capture security analysis). Once the product is installed, a setup wizard helps you configure NetResident in accordance with your intended usage and existing security policies and define the network hosts to be monitored.
While NetResident is similar to network analyzers in many respects, it focuses on high-level protocols that are used to transfer content over the Internet or LAN. With NetResident, you don't need a profound understanding of networking technologies and you don't have to use complex packet capturing and analysis software or hardware. A convenient application console presents a clear picture of all captured network events that can be grouped or sorted by different criteria.
NetResident offers many benefits to your organization. Unlike many data loss detection solutions, NetResident can be quickly and easily deployed by the organization's network administrator and does not require substantial changes in the existing network infrastructure or software. A standard PC running NetResident can be configured, connected to the monitoring port, and monitoring within minutes.
By taking advantage of a 30-day free trial period, you can make sure that the solution fully meets your requirements before purchase. Small- and mid-sized businesses will appreciate the low cost of the software that by far beats competing solutions. The product price is far below the high costs of embarrassing data loss events that may happen in any organization.
Who Uses NetResident
NetResident is used by businesses for detecting sensitive information leaks, by government law enforcement and security agencies and private surveillance providers for lawful interception needs, by forensic experts for inspecting evidence and gaining crucial information needed for criminal investigations, and even by parents for monitoring their children’s communication on the Internet.
System Requirements and Download
NetResident runs on Microsoft Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2. Both 32- and 64-bit versions are supported. An evaluation version is available in the Download Area. To purchase this product, add it to the shopping cart (see the link at the top right corner of this page) or visit the Product Catalog.
Be sure to read our white paper, Promiscuous Monitoring in Ethernet and Wi-Fi Networks that examines the problems related to the deployment and usage of software-based network monitoring solutions in wired and wireless LANs. It demonstrates the methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.