Lastline - DS - Defender - HW SPEC
Lastline - DS - Defender - HW SPEC
Lastline - DS - Defender - HW SPEC
Lastline Defender
Network Detection and Response Platform
Lastline DefenderTM is a Network Detection and Response (NDR) platform that detects and contains
sophisticated threats before they disrupt your business. It delivers the cybersecurity industry’s highest fidelity
insights into advanced threats entering or operating in your entire network, enabling your security team to
respond faster and more effectively to threats.
Detection You
Agentless Visibility Validated Alerts
Can Act On
4,750 61 12 10
Internal Hosts Internal Hosts Internal Hosts Internal Hosts
Figure 2: Lastline Defender reduced 214 PB of data analyzed in one month in one network to only 4 intrusions affecting 10 hosts.
Attack Stages
Figure 3: Lastline Defender Helps your SOC team quickly understand the attack stage
Intrusion Blueprint
Email address
Email message
DMSniff
Downloaded file
Hostname iwtrgdye.net
Host
Blacklisted entry
Info
Analysis report
5.45.86.234 172.16.27.9
Threat
172.16.27.17
HTTP request
172.16.27.12
172.16.27.14
172.16.27.10
172.16.27.15
Figure 4: Lastline Defender shows an attack’s progress in your network including compromised systems and communication with external systems.
1 2 1 1 1
Processor(s)
Xeon® Silver 4114 Xeon® Silver 4114 Xeon® Silver 4116 Xeon® Silver 4114 Xeon® Silver 4114
RAM 32 GB 128 GB 64 GB 64 GB 64 GB
2 x 1 TB 2 x 1 TB 4 x 2 TB 4 x 2 TB 2 x 1 TB
Hard Disk Drive 3.5 SATA HDD 3.5 SATA HDD 3.5 SAS HDD 3.5 SATA HDD 3.5 SATA HDD
(7.2K RPM) (7.2K RPM) (10K RPM) (7.2K RPM) (7.2K RPM)
Software RAID 1 1 10 10 1
Intel Intel
Network Adapter Onboard Onboard Onboard
I350 Quad port X710-DA2
Dimensions
17.1“ x 25.9“ x 1.7“ (43.4 x 65.7 x 4.3 cm)
(Width x Depth x Height)
(up to 4) 1 GbE
Monitoring Ports (4) 1 GbE Ports*** (up to 2) 10 GbE - - -
Ports***
Up to 10,000
Files Analyzed - - - -
per day*
Up to 30 Engines
Scalability of Engines - - - -
per Manager
Up to 200 Sensors
Scalability of Sensors - - - -
per Manager
* Cluster N number of components to scale as needed. Performance varies by object type.
** Apply pre-filter to quickly determine maliciousness and submit unknown files for detailed analysis by Deep Content Inspection
*** Supported Intel NIC required for throughput over 200 Mbps
Note: Performance values are based on “standard” profile. Values may vary depending on your environment.