Skip to main content
Version: 2.9.0

Key Features


  • Identifies security threats and traces current known threat sources

  • Identifies security risks and internal threats, which could be missed by firewalls and other IDS systems

  • Identify large amounts of data moved outbound to external sites or laterally within your network

  • Enriches flow data with current Reputation and GEO IP information

  • Drill in to see which hosts are affected

  • Early warning DDOS attack detection

  • Enables you to look back in time for forensic investigation by setting a NetFlow Recorder rolling period of time


Monitoring of AWS via VPC Flow Logs

  • Ability to read VPC Flow Logs from Kinesis or CloudWatch or S3

  • Ability of supporting many AWS accounts, VPCs, and AWS regions with one NFO EC2 instance

  • Enrichment of flow records with VPC name, EC2 instance name, DNS name, and AWS region

Monitoring of Microsoft Azure NSG Flow Logs

  • Ability to read Azure NSG Flow Logs

  • Ability of supporting many Azure storage accounts, accessing NSG Flow logs via Service Principle or System-assigned Managed Identity

  • Enrichment of flow records with Virtual Network name, VM name, DNS name, and Azure region

Monitoring of Google Cloud Platform (GCP) VPC Flow Logs

  • Ability to read GCP VCP Flow Logs

  • Ability of supporting many GCP Service accounts and projects

  • Enrichment of flow records with VPC Network name, Subnetwork name, Instance name, DNS name, and GCP zone

Monitoring of Network Device Health

  • Identification of overload conditions

  • With our SNMP polling

    • CPU utilization
    • Memory utilization
    • Tracking of interface errors
    • Dropped packets counter
    • Flapping interface identification
  • Latency / Jitter

Monitoring of User Activity

  • Integration with Windows Domain Controller enables to match user IP address using login events

  • Integration with other identity systems by receiving login / logout events via syslog

Application Visibility via Flows from

  • Cisco AnyConnect or other Cisco devices generating Application Visibility Control (AVC) flows

  • Fortinet devices (e.g. FortiGate) reporting applications in IPFIX

  • Palo Alto Network devices

  • Other devices detecting applications using DPI, e.g. Cubro's Omnia

  • Any exporter based on known destination ports

Virtual Network / Physical Network Visibility

  • Pinpoints physical devices and interfaces impacting VM performance, on a Splunk dashboard

  • Reconstructs paths VM-to-VM and VM-to-host conversations over the underlying physical network

Real-time Consolidation of Any Flow Data

  • Enables customers to store and index only a fraction of volume and at the same time gain all benefits of flow information without losing accuracy

  • Deduplication: optionally report flows only from authoritative router/switch. Authoritative network device is determined as the one that sees the most flows for each communicating pair. This is recalculated every 30 seconds (by default, and could be changed), thus providing accurate information in a dynamic network environment

  • Capable to process any standard flow protocols, NetFlow v5/v9, Flexible NetFlow, NetFlow Options, IPFIX, sFlow (both data records and counter records), J-Flow, NetStream

Common Features

Unmatched Performance Utilizing Patented Technology

  • Capable of processing 1,000,000 flows per second without a single drop

  • Can process up to 350,000 flows per second with consolidation

OS Platforms

  • Linux

  • Windows

  • Amazon AMI

Enriches Flow Data with Real-time Information

  • Reverse-DNS

  • SNMP polling

  • VMware vCenter VMs

  • Security Reputation

  • GeoIP at Country or City level

Modular Approach

  • Enables customers to enable and configure features to address their specific use cases

  • NFO is a software solution. Same code base for Windows and Linux, as well as virtual appliance

Built-in Services

  • NetFlow Recorder – enables you to look back in time. You can set rolling flow capture and replay period of time, and store flows in memory or on disk, then press <Replay> button to send these records in syslog or JSON format to your SIEM to gain complete visibility of past network traffic

  • Reverse DNS lookup – add host names to IP addresses

  • SNMP Polling and SNMP Traps support


  • Integration with Active Directory. Supports Two Factor Authentication

  • NFO can be configured via our GUI or REST API. Useful to customers with a large number of locations


  • NFO outputs flow data in standard syslog or JSON format

  • Supports up to 16 output destinations, which could be configured to send out various types of data (e.g. retransmit flows to a legacy flow collector, while producing analytics to be sent to your SIEM)

  • with Splunk Enterprise, Splunk Cloud, Splunk ITSI, Splunk ES, Splunk Observability Cloud

  • with Sumo Logic

  • with Exabeam

  • with Amazon Open Search

  • with Elastic

  • with VMware vRealize Log Insight