CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree
Optimize Your Network with Our Unique Disaggregation Approach
CGS Tower Networks optimizes cyber security, Big Data analytics, and monitoring applications deployed on both physical and virtual platforms, by eliminating network blind spots and reducing data overloads. CGS’s disaggregation approach revolutionizes the network visibility market with the most modern, scalable, and powerful network packet brokers, resulting in superior network visibility and compelling TCO.
CGS Tower Networks was founded in 2014 and is managed by industry leaders with a track record of success in introducing innovative and superior products and services to the market. Our committed team has vast experience in research and development of networking solutions, overcoming technical challenges and maintaining flexibility and creativity required to meet every customer need.
CGS Tower Networks products were originally designed in a modular and scalable way that leverages industry-leading hardware platforms, for delivering superior performance, reliability, scalability and TCO.
Traffic is the foundation of all information security and network performance analysis. Any network tool needs to receive the correct traffic in order to achieve the best benefits. How to simplify the traditional traffic mirror method and filter out the massive traffic Feeding the correct traffic to the corresponding tool is the most important function of the traffic replicator and splitter.
CGS Network Packet Broker (NPB), covering the basic to the most advanced functions of NPB. In addition to basic packet filtering, aggregation, replication, distribution, and weighted traffic load balancing, it can also handle advanced output packets, including packet slicing, de-duplication, MAC/IP replacement, Get off the ERSPAN terminal, transfer 100% of the traffic to Netflow, extract the corresponding IP list from the Domain Name, data masking and other advanced functions, and use RegEx to perform in-depth DPI full packet analysis of the packet payload, and compare the packet location. All packets of the session are filtered out together. It also supports Tool Service Chain, concatenates and distributes traffic to multiple Inline tools, and uses Heartbeat to detect the health status of Inline tools, so that a single faulty tool will not affect the detection traffic of other tools, which greatly simplifies the deployment of cyber security tools , and improve device or network performance device analysis capabilities.
1. 100% traffic transmission, guarantee no packet loss.
2. Traffic replication, aggregation, distribution, load balancing, filtering, and replication of single-source traffic to multiple tools for analysis.
3. Allocate specific required traffic to specific tool analysis to improve tool analysis efficiency.
4. Whitelist specific traffic to reduce the load of Inline devices and extend the service life.
5. Multi-line sharing inline information security equipment
6. Advanced packet processing, including RegEx, De-Duplication, Replication, Timestamping, Data Masking, GRE Tunneling, ERSPAN Termination
7. Multiple CGS devices can be distributed, managed centrally, and shared resources
8. Tool Service Chain Service Chain"