Symantec Network Forensics: Security Analytics

Get complete security visibility, advanced network forensics, and real-time threat detection with enriched, full-packet capture

Read the Solution Brief Learn More

Comprehensive Network Forensics to Expose Source and Scope of Any Attack

Like a security camera or DVR for your network.

Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes. Security Analytics is an advanced network forensics analysis and analytics tool enabling you to:

  • See the full source and scope of attacks and respond faster
  • Arm incident response teams with clear, concise answers and evidence
  • Use unrivaled data enrichment and threat intelligence
  • Add context to existing security tools
  • Integrate with Symantec ATP to extend investigations across network, endpoint and email

Learn More

Know Your Security Risks at the Push of a Button

See what's happening on your network.

Simply deploy Security Analytics appliance or virtual appliance on your network and capture traffic. Let it run for a few days or a week, then push a button and generate a comprehensive PDF report that covers critical areas including:

  • Predicted file count hidden in encrypted traffic
  • The amount of encrypted traffic crossing your network
  • Risky applications on the network
  • Anomalous network behavior based on a benchmark of your actual traffic
  • An executive summary to share with security team or management so you can prioritize activities

Get a Sample Report

Go Beyond Manual Forensics and Packet Capture

Transform manual forensics into automated incident response.

With a fully enriched "system of record", your incident response teams will reduce time to resolution and answer the what, when, and how of any security incident through root-cause exploration, deep packet inspection, integrated reputation services and data enrichment, and advanced context-based reporting on malicious activity.

  • Enrich all traffic data with the latest threat intelligence
  • Rely on multiple reputation sources
  • Perform sophisticated anomaly detection
  • Scan SCADA protocols
  • Extract and broker only truly unknown files for sandbox analysis to save resources

Download the Data Sheet

Threat Hunting: A Proactive Approach to Cybersecurity

Why react when you can act?

With Symantec Security Analytics, your IT security team can proactively search for potential hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advanced threats before they can launch an attack.

  • Expose the source and scope of a developing attack with unrivalled data enrichment and threat intelligence
  • Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
  • Reduce time-to-resolution with sophisticated anomaly detection and advanced network forensics
  • What's the difference between Incident Response and Threat Hunting? Read the blog.

Watch the Webinar

Uncover Security Threats Hiding in Encrypted Traffic

Gain total visibility into network traffic by deploying with Symantec SSL Visibility.

Use Symantec Security Analytics to enable meticulous network forensics and monitoring across all network traffic, thousands of applications, dozens of file transports, all flows, and all packets—including encrypted traffic when deployed with Symantec SSL Visibility. Gain total visibility into network traffic with actionable intelligence so you can quickly shut down exposure and mitigate ongoing risk.

  • See detailed insights from all forensic captures
  • Establish policies to selectively decrypt SSL traffic
  • Share encrypted traffic insight with your security applications

Learn More

Free Security Analytics Virtual Appliance Trial

Register for a free 30-day trial of the Security Analytics Virtual Appliance and discover the power to see, understand, and respond to advanced targeted attacks on your network.

Free Trial

Discover Our Community

View the latest product discussions in our forums.

Learn More

Need help?

Technical support and more.

Learn More

Related Products and Services

Data Sheets

Security Analytics Software

Gain the visibility, analytics, real-time threat intelligence, and system of record you need to uncover and stop advanced threats.

Security Analytics Appliance

Get complete network visibility and forensics out of the box to run full retrospective analysis and react to issues in real time.

Security Analytics Virtual Appliance

Get visibility and retrospective analysis into your traffic with full capture and replay, classification, anomaly detection, and inspection.

White Papers

Security Analytics – A Cornerstone of Effective Security Incident Response

Understand why security analytics is the cornerstone of incident response.

The Value of Enhancing Information Security and Incident Response with Automated Anomaly Detection

Learn about the value of improving information security and incident response with automated anomaly detection.

Solution Briefs

Security Analytics

See, understand, and swiftly respond to advanced threats.

Moving Beyond Check-Box Compliance to Truly Effective Security

Effective security supports compliance but also provides total network visibility to prevent attacks and swiftly respond to incidents.


Analyst Market Leadership Award

Security Analytics is recognized by Frost and Sullivan for Network Security Forensics Market Leadership.

Radicati APT Protection Market Quadrant 2018

Security Analytics plays an important role in Symantec's "Top Player" recognition

Other Resources

Advanced Threat Assessment

Try Symantec Security Analytics and Packet Capture and see what’s going on in your network. Request a consultation.

Security Analytics Integration Partners

Integrate with leading NGFW, IPS, SIEM, Sandboxing and EDR solutions to gain actionable intelligence with detailed forensic evidence.

Threat Hunting – Be Proactive to Be Protected

What's the difference between Incident Response and Threat Hunting? Read the blog.

Customer Success


Rackspace Turns Traditional Incident Response into "Proactive Hunting"


Jefferies - Compliance Without Constraint

Government Defense Contractor

Major Government Defense Contractor Speeds Incident Response with Symantec


Legal Information

Learn more about legal terms, policies and notices.

License and Service Terms & Repository

Purchasing Options Free Trial