Network control at the highest level
In a world that’s more competitive every day, enterprises and organizations require the means to ensure access to information as quickly as possible, either to get ahead of competitors or to maintain internal efficiency. With this in mind, much of the activity from companies and organizations tends to move to remote offices, so that the communications network becomes a key asset for success and fast and efficient monitoring and diagnosis tools are required to be able to answer questions such as:
  • What is the application’s distribution on the network?
  • How are the applications affecting the network and other applications’ performance?
  • Is it possible to prioritize critical applications versus others?
  • Why are the users experiencing a temporal failure/slowness of an application or entire access?
  • How possible is it to determine how a new application will impact existing ones?
  • Are there connections that are saturated, oversized, or congested?
  • How is the network infrastructure currently performing?
  • What is the actual usability and availability of applications and thus, the general user experience?

Challenges Solved

The Visualizer is a network analysis tool integrated into the be.SDx management platform. It receives traffic data from the Teldat and other brands’ devices via the standard Netflow/IPFIX protocol at an application level. Traditional analysis based on level 3/4 is no longer sufficient in today’s networks, since current applications are mostly using http or https as a transport protocol, and thus a very detailed level 7 analysis is necessary to identify application traffic.

be.SDx Visualizer as a SaaS – offering, running over Google Cloud, based on Kubernetes, which provides a highly scalable and reliable solution for customers. The software is divided into functional blocks, and each block runs in a separate container, so it’s possible to individually scale or update a functional block. Additionally, it’s easy to include new capabilities, guaranteeing the evolution of the Visualizer-platform.

The hierarchical structure of the tools allows for the organization of user profiles that can access the port using different permissions. At once, all of the devices can be grouped together as many times as needed to adapt themselves to the structure of the business and its locations and carrying out filtering as specifically as needed and in a straightforward manner.

Key Features

Outstanding Dashboards

Impressive dashboards that users can build in seconds in a simple and intuitive yet powerful way, selecting which information shows and how it must be filtered. This way it is easy to carry out a proactive analysis and ensure the availability and reliability of principal business applications. The functionality of the “time machine” allows you to move to concrete dates and times, automatically adapting all graphics to carry out forensic analysis.

Comprehensive Monitoring

An analysis is possible for a particular access, site, or the whole network. It is always easy to get data evolution in each time interval, compared as heat maps, cake distributions, and performance metering. Results are filtered and sorted, such as remote site and interface, IP addresses, session, protocol, ports, flags, domain, L7 application, or geolocation data.

HTTP/HTTPS Analysis and Monitoring

Today, more than 90% of internet traffic is http/https, whether its browsing sessions or applications that increasingly use such transport. Visualizer identifies each http/https session and decodes level 7 data to sort or filter by the destination domain/application used, even if it is encrypted with https.

Reporting and programmable alerts

Visualizer generates and sends reports with relevant chosen information per day, week, or month. Detect and solve any issue before any impact. Notifications allow you to receive information about network anomalies (traffic volume from a country/address/ application, prohibited applications, possible viruses, or attacks) so you can act proactively.

Infrastructure Monitoring & Encryption

To guarantee the availability of the solution, Teldat is continuously monitoring the Kubernetes infrastructure. The NetFlow/IPFIX traffic between the devices and the collector is encrypted using TCP/TLS. The overall performance of the system is dynamically scaled vertically, thus guaranteeing a high-performance analysis result, even in the largest environments to be analyzed.

Making the Net Work


For more information about our SD-WAN solution simply contact us.

Our team of specialists will respond immediately.