Monitoring and response

Gain visibility into app and network activity with simplified security monitoring and detection

Even in the best-secured environment, maintaining compliance and preventing breaches can be almost impossible without security monitoring and detection.  

Our solutions give you better visibility into your app and network activity using log monitoring, analysis, and escalation so you can filter noise from salient information, detect abnormal connection attempts, and identify indicators of attack and compromise. They also integrate with many third-party advanced detection systems to help you reduce the scope of security and compliance audits.

Watch over user activity to keep things running smoothly

Visibility into your users’ activity will enable you to anticipate and quickly respond to performance degradation, whether it’s on the endpoint, network, or server side.

Because visibility can be more challenging in complex deployments with lots of applications, NetScaler ADC simplifies monitoring by providing a central point through which all application information travels. While the primary purpose of this design is to allow load balancing and SSL offload for scalability and availability, it also ideally positions NetScaler to parse both web and ICA traffic for any type of application using any type of encryption.

NetScaler Management and Analytics System provides real-time analytics to help you identify and address application performance and security issues across your network infrastructure. It also provides application-level integration with external orchestration systems.

Detect attacks and breaches faster with logging and alerting

Regular security auditing and accounting of user access, configuration changes, and account management logs help capture early indicators of attack and compromise. Some things to look out for include unusual and large volume of outbound traffic, unusual account activity—especially for privileged accounts—and failed and successful logons from unusual locations.

NetScaler ADC auditing provides logs for real-time and historical actions, like successful or failed authentication or authorization attempts, and AAA sessions for all application traffic.

Reduce the scope of security compliance audits

Strict adherence to high encryption standards has long been a requirement for government agencies. FIPS compliance is quickly becoming a topic of interest in commercial spaces, banks, credit card processors, and healthcare organizations seeking to secure traffic inside their data centers.

Our solutions protect traffic between devices and your data center using Common Criteria-validated configurations and FIPS 140-2 capabilities, helping you better comply with regulations and requirements, and reduce the scope of compliance audits.

NetScaler ADC integration provides FIPS 140-2 Level 3 compliance for an even higher level of information assurance with a hardened appliance. Data centralization, hosted delivery, and remote display restrict PCI data to a small, protected space that can be audited more completely and efficiently than an entire internal network.

XenApp and XenDesktop and NetScaler together make up the only end-to-end app and desktop delivery solution available that meets Common Criteria certification, an ISO standard for software security function that evaluates authentication, access control, administration, and secure communication.

Explore products

NetScaler ADC

  • Industry-leading application delivery controller that provides proven L4-7 load balancing and GSLB to ensure the best app performance and reliability
  • Provides web app security and optimization through a single, strategic platform
  • Integrates with third-party advanced detection systems to improve network monitoring and help reduce the scope of security and compliance audits
  • Protects against all DDoS threats, using a layered security model

NetScaler Management and Analytics System (MAS)

  • Centralized network management, analytics, and orchestration solution
  • A single platform to monitor, automate, and manage network services for scale-out application architectures
  • Real-time analytics to help administrators identify and address application performance and security issues across the infrastructure
  • Application-level integration with external orchestration systems

XenApp and XenDesktop

  • Securely deliver virtual apps and desktops centrally from the data center
  • Allow for strict access control policies, making it easier for IT to protect against remote desktop security risks and meet compliance standards
  • Simplify management with full activity logging, reporting, and auditing built in
  • Common Criteria certified to meet the highest security standards
  • FIPS 140-2 compliant, simplifying regulated compliance