Skip to content

🎉 Get 10% off select products – Use code WELCOME10 at checkout!

HPE

HPE IntroSpect FPC 2000 Network Security/Firewall Appliance

SKU: JZ261A
USER AND ENTITY BEHAVIOR ANALYTICS

Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

WHAT WE DETECT: SECURITY ANALYTICS USE CASES

IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:
  • Account Abuse
  • Account Takeover
  • Command and Control
  • Data Exfiltration
  • Lateral Movement
  • Password Sharing
  • Privilege Escalation
  • Flight Risk
  • Phishing
  • Ransomware
ACCELERATED INVESTIGATION & RESPONSE

From SysAdmins to Systems to Sensors - Providing Instant Visibility

IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
  • Profiles for users, systems and devices
  • Access by SIEM, NAC systems, etc. via an open API
  • Pre-packaged incident response playbooks
  • Customer-measured 30 hours/investigation savings
  • Automatic detection of other entities impacted by the attack
THREAT HUNTING

Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
  • Rich analytics to test threat hypotheses across any timeframe
  • Automated search of historical data using IOC's from STIX and custom threat feeds
  • Visualizations to highlight anomalies and significant interactions
  • Significant activity monitored and tagged to assist with both hunting and investigations
DATA SOURCES

The IntroSpect platform processes the broadest range of data sources, including:
  • VPN, FW, IPS/IDS, Web proxy, Email logs
  • NetFlow
  • Packets
  • DNS logs
  • Active Directory logs
  • DHCP logs
  • External threat feeds
  • Alerts from 3rd party security infrastructure
DEPLOYMENT OPTIONS
  • On-premise VM or appliance for Packet Processor
  • AWS or on-premise deployment for Analyzer

KEY INTEGRATIONS

  • ArcSight
  • Aruba ClearPass
  • Blue Coat
  • Checkpoint
  • Cisco
  • FireEye
  • Forcepoint
  • Fortinet
  • Gigamon
  • IBM QRadar
  • Infoblox
  • IXIA
  • Juniper
  • McAfee (as in proxy server)
  • Microsoft
  • Palo Alto Networks
  • Splunk
  • Designed to be the central hub of all network security activity with maximum productivity
  • Safeguard your data from external and internal threats by using this firewall appliance that also supports network attack detection firewall protection

Call for Availability

Regular price $40,866.62 Sale price $49,710.00
On Sale

Shipping calculated at checkout

Details
USER AND ENTITY BEHAVIOR ANALYTICS

Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

WHAT WE DETECT: SECURITY ANALYTICS USE CASES

IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:
  • Account Abuse
  • Account Takeover
  • Command and Control
  • Data Exfiltration
  • Lateral Movement
  • Password Sharing
  • Privilege Escalation
  • Flight Risk
  • Phishing
  • Ransomware
ACCELERATED INVESTIGATION & RESPONSE

From SysAdmins to Systems to Sensors - Providing Instant Visibility

IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
  • Profiles for users, systems and devices
  • Access by SIEM, NAC systems, etc. via an open API
  • Pre-packaged incident response playbooks
  • Customer-measured 30 hours/investigation savings
  • Automatic detection of other entities impacted by the attack
THREAT HUNTING

Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
  • Rich analytics to test threat hypotheses across any timeframe
  • Automated search of historical data using IOC's from STIX and custom threat feeds
  • Visualizations to highlight anomalies and significant interactions
  • Significant activity monitored and tagged to assist with both hunting and investigations
DATA SOURCES

The IntroSpect platform processes the broadest range of data sources, including:
  • VPN, FW, IPS/IDS, Web proxy, Email logs
  • NetFlow
  • Packets
  • DNS logs
  • Active Directory logs
  • DHCP logs
  • External threat feeds
  • Alerts from 3rd party security infrastructure
DEPLOYMENT OPTIONS
  • On-premise VM or appliance for Packet Processor
  • AWS or on-premise deployment for Analyzer

KEY INTEGRATIONS

  • ArcSight
  • Aruba ClearPass
  • Blue Coat
  • Checkpoint
  • Cisco
  • FireEye
  • Forcepoint
  • Fortinet
  • Gigamon
  • IBM QRadar
  • Infoblox
  • IXIA
  • Juniper
  • McAfee (as in proxy server)
  • Microsoft
  • Palo Alto Networks
  • Splunk
  • Designed to be the central hub of all network security activity with maximum productivity
  • Safeguard your data from external and internal threats by using this firewall appliance that also supports network attack detection firewall protection
Specifications
Firewall Protection Supported:
Network Attack Detection,Anti-phishing,Threat Protection
Manageable:
Yes
Manufacturer:
Hewlett Packard Enterprise
Manufacturer Website Address:
http://www.hpe.com
Product Line:
IntroSpect
Product Model:
FPC 2000
Product Type:
Network Security/Firewall Appliance
Support/Service Duration:
1 Year

LTT PARTNERS

We are a full-service Systems and Solutions Integrator. Through close relationships with dozens of top technology brands, we are the preferred partner for many enterprise organizations and industry leaders.

Learn more
Smiling man on a support team on a virtual call with a headset.

ONGOING SUPPORT

We pride ourselves on building long-term relationships with our partners and clients. From initial consultation to post-installation maintenance, we are always available and happy to help through our support network.

Learn more

Have Questions? We Can Help!

Close (esc)

GET 10% OFF SELECT PRODUCTS!

Enter your email to take advantage of this one time offer.

Age verification

By clicking enter you are verifying that you are old enough to consume alcohol.

Search

Header > Main Menu

Shopping Cart

USER AND ENTITY BEHAVIOR ANALYTICS

Aruba's User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have evaded traditional security defenses. Aruba IntroSpect integrates advanced AI-based machine learning (ML), pinpoint visualizations and instant forensic insight into a single solution, so attacks involving malicious, compromised or negligent users, systems and devices are found and remediated before they damage the operations and reputation of the organization.

With a Spark/Hadoop platform, IntroSpect uniquely integrates both behavior-based attack detection and forensically-rich incident investigation and response at enterprise scale.

WHAT WE DETECT: SECURITY ANALYTICS USE CASES

IntroSpect provides 100+ supervised and unsupervised machine learning models focused on detecting targeted attacks at each stage of the kill chain:
  • Account Abuse
  • Account Takeover
  • Command and Control
  • Data Exfiltration
  • Lateral Movement
  • Password Sharing
  • Privilege Escalation
  • Flight Risk
  • Phishing
  • Ransomware
ACCELERATED INVESTIGATION & RESPONSE

From SysAdmins to Systems to Sensors - Providing Instant Visibility

IntroSpect Entity360 is key to reducing the time and effort required to understand, diagnose and respond to an attack. Entity360 provides a comprehensive security profile with continuous risk scoring and enriched security information - analysts would otherwise spend hours or days searching for and compiling months and years of security data down to the packet level. Entity360 provides:
  • Profiles for users, systems and devices
  • Access by SIEM, NAC systems, etc. via an open API
  • Pre-packaged incident response playbooks
  • Customer-measured 30 hours/investigation savings
  • Automatic detection of other entities impacted by the attack
THREAT HUNTING

Proactive threat hunting is easily accomplished with a powerful query interface, without the overhead of finding, searching, and summarizing isolated data stores.
  • Rich analytics to test threat hypotheses across any timeframe
  • Automated search of historical data using IOC's from STIX and custom threat feeds
  • Visualizations to highlight anomalies and significant interactions
  • Significant activity monitored and tagged to assist with both hunting and investigations
DATA SOURCES

The IntroSpect platform processes the broadest range of data sources, including:
  • VPN, FW, IPS/IDS, Web proxy, Email logs
  • NetFlow
  • Packets
  • DNS logs
  • Active Directory logs
  • DHCP logs
  • External threat feeds
  • Alerts from 3rd party security infrastructure
DEPLOYMENT OPTIONS
  • On-premise VM or appliance for Packet Processor
  • AWS or on-premise deployment for Analyzer

KEY INTEGRATIONS

  • ArcSight
  • Aruba ClearPass
  • Blue Coat
  • Checkpoint
  • Cisco
  • FireEye
  • Forcepoint
  • Fortinet
  • Gigamon
  • IBM QRadar
  • Infoblox
  • IXIA
  • Juniper
  • McAfee (as in proxy server)
  • Microsoft
  • Palo Alto Networks
  • Splunk
  • Designed to be the central hub of all network security activity with maximum productivity
  • Safeguard your data from external and internal threats by using this firewall appliance that also supports network attack detection firewall protection