strongarm insights

Eyes on Your Network: Introducing Strongarm Insights!

March 9, 2017 | By

As a small business, it’s difficult to know what websites are being accessed from your network. With the advent of IoT devices, BYOD culture, and the widespread use of both work and personal apps by employees, that lack of visibility brings risk to your data and reputation. Business owners want to know exactly what services and websites their employees (and anyone connected to the network) are using. It’s really the only way to ensure security, and it also enables productivity and successful business operations.

Whether it’s a dangerous backdoor to your data, a ransomware attack, or hijacked resources being used for illegal activities, not knowing what your network is up to can become a major headache, to say the least.  While this network data has always existed, it has been buried in logs from a variety of sources and not easily accessible to you or your IT staff. Small businesses often don’t have the time and resources it takes to manually pull together the data. Bottom line, valuable data about network activity is often incomplete, hard to access, or forgotten about.

That’s why we created Strongarm Insights. Included as part of the Strongarm platform, Insights provides a simple, visual summary of all outbound DNS requests made by a protected organization. Strongarm Insights saves valuable time by automatically correlating data and visually presenting it in an easy-to-read format. Forget manually combing through logs and alerts. A single pane of glass gives you all the details you need to make the right choices for your organization. Business operators, IT managers, or managed service providers can quickly spot any suspicious activity or violations of corporate policy and take the right steps to ensure security and business continuity.

How To Use Strongarm Insights

To take advantage of Insights, Strongarm users can simply log into their Strongarm accounts and visit the Insights tab. Administrators can then view reports showing the most requested domains, group these requests by category, and see requests graphed by time of day. This info can help identify trends like:

  •      What types of applications and services your users are using (safe or not)
  •      Whether IoT devices are vulnerable to hijacking
  •      Whether requests are being made after work hours (when the network should be quiet)
  •      How your network traffic compares to other businesses of your size
  •      How the activity changes week by week

On top of this, our support team is available to analyze and discuss any network trends spotted within Insights and help you figure out whether you need to take action.

Here’s what the Insights dashboard looks like:

strongarm insights screenshot 1

Drilling down, you can see requests per hour. You can also see the top domains requested and the types of sites your users are visiting. This information is invaluable in making sure that your network is being used in ways that are safe and beneficial to your business.

Strongarm Insights in Action

One Strongarm Insights beta user has already reported uncovering thousands of unknown connections between the organization’s networks and peer-to-peer networking or Tor sites (obviously, not something you want happening on your business’s network). Another user discovered a chatty internet TV that was phoning home to Asia constantly (which could indicate malware or other suspicious activity). The new feature enabled these users to spot the unexpected behavior and shut it down before it created a security incident.

Get Started with Insights Today

Strongarm Insights is available now to Strongarm customers. If you are not yet a Strongarm customer, you can sign up for a free trial to give it a whirl: