CryptoniteNXT stops a hacker’s primary tactics at the point of attack, and integrates into your existing security framework—reducing data flows and focusing your resources on high priority alerts.

Works with standard network protocols 

Logs can be forwarded to security information and event management systems, such as Splunk, that support the common event format.

Supports IP-enabled devices. Protects traditionally unprotected devices including printers and legacy devices.

IPv4 supported, aides in IPv6 migration by simultaneously supporting both IPv4 and IPv6 address spaces

Transparent to the user

Performance degradation similar to a hop through a switch

Integrates with other Network and Security Monitoring products, such as Palo Alto Networks Next Generation Firewall products.

Our appliance resides between a core switch and an access switch