Network Forensics

Our Network Forensics Division Can Help With the Following:

Tier3 can identify and correct network issues using industry standard protocol analysis.

TROUBLESHOOTING

  • Overcome “Needle int he Haystack” issues.
  • Locate faulty network devices, a point of packet loss, and misconfigured hosts
  • Identify device or software misconfigurations, network errors and service refusals, protocols and applications in use, asynchronous traffic prioritization, HTTP error responses indicating client and server problems & average and unacceptable service response times (SRT)
  • Measure high delays along a path
  • Graph Queuing delays
  • Find top talkers on the network
  • Determine the average packets per second rate and bytes per second rate of an application or all network traffic on a link
  • List all hosts communicating
  • Recognize the most common connection problems
  • Spot delays between client requests due to slow processing
  • Detect network or host congestion that is slowing down file transfers
  • Graph HTTP flows to examine website referral rates
  • Build graphs to compare traffic behaviors
  • Examine the startup process of hosts and applications on the network
  • Find the cause of performance problems

SECURITY-RELATED TASKS

  • Perform intrusion detection
  • Identify and define malicious traffic signatures
  • Passively Discover hosts, operating systems, and services
  • Log traffic for forensic¬†examination
  • Capture traffic as evidence
  • Test Firewall blocking
  • Validate secure login and data traversal
  • Identify applications that do not encrypt traffic
  • Identify unusual scanning traffic on the network

OPTIMIZATION-RELATED TASKS

  • Analyze current bandwidth usage
  • Evaluate efficient use of packet sizes in data transfer applications
  • Evaluate response times across a network
  • Validate proper system configurations

APPLICATION-RELATED TASKS

  • Analyze application bandwidth requirements
  • Identify application protocols and ports in use
  • Validate secure application data traversal
  • Graph application throughput
  • Deep-packet inspection and analysis