This site uses cookies to enhance your experience.  By continuing to visit this website, you consent to the use of these cookies. Click here to learn more about our privacy policy.

Product Introduction

Sangfor Cyber Command

Intelligent Threat Detection and Response Platform 

Cyber Command can be trusted to improve overall IT security and risk posture:

  • Significantly improves overall security detection and response capabilities by monitoring internal network traffic
  • Correlating existing security events, applying AI and behavior analysis, all aided by global threat intelligence.
  • Uncovers breaches of existing security controls while impact analysis identifies hidden threats within the network.
  • Integrates network and endpoint security solutions so that it can respond to threats is automated and simplified.  

Features and Capabilities

Sophisticated Detection

The Cyber Command Analysis Center collects a broad range of network and security data including North-South and East-West traffic data, logs from network gateways and EDRs, decodes it using network applications like DNS or mail, and applies AI analysis to uncover undesirable behavior. As Cyber Command is paired with threat intelligence, attacks on all levels of the attack chain are detected, meaning faster alerts to exploitation attempts, slow brute force attacks, C&C activities, lateral movements, P2P traffic, and data theft. 

Faster and More Efficient Response

The Cyber Command Response Center provides a broad range of attack investigation experience, all presented visually within the attack chain. Threat mitigation is prioritized based on the criticality of the at-risk business assets. Combined with Sangfor Endpoint Secure and NGAF, Cyber Command provides flexible and effective mitigation in a timely manner, offering recommendations for policy or patching, endpoint correlation, and network correlation. 

Simplify Threat Hunting

Cyber Command helps security administrators to perform comprehensive impact analysis of known breaches and to track “patient zero,” by evaluating all possible points of entrance. Cyber Command’s unique “Golden Eye” feature studies the behavior of compromised assets like inbound and outbound connections and usage of ports and protocols, and uses this valuable information to strengthen external and internal system defenses. 

Product Models

Specifications

CC-1000

CC-2000

CC-3000

Performance based on STA Mode

5 STA-100

8 STA-100

12 STA-100

Daily access log number (Million / Day)

20

25

35

Average EPS (per log/SEC)

250

315

435

Peak EPS (per log/SEC)

1000

1200

1500

Disk consumption (GB/day)

11

14

20

Estimate storage days based on
above parameter (days)

1350

1440

1290

Memory

96G

128G

256G

CPU

16 Cores

16 Cores

20 Cores

System Disk

SSD 128G

SSD 128G

SSD 128G

Data Hard Drive Capacity

SATA 4T*8

SATA 4T*10

SATA 4T*12

LSI Raid

Raid 50

Raid 50

Raid 50

Dimensions (cm)

664*444*88

660*425*90

735*447*88

Rack Height

2U

2U

2U

Gross Weight

42KG

45KG

45KG

Power Supplies

Redundant

Redundant

Redundant

Nominal Power

383W

385W

473W

Maximum Power

550W

550W

550W

Bypass

N/A

N/A

N/A

Copper Analysis Ports

4 x 10/100/1000
BASE-T

4 X 10/100/1000
BASE-T

6 X 10/100/1000
BASE-T

SFP + Analysis Ports

N/A

2X 10GBE SFP+

2X 10Gbe SFP+

Serial Ports

N/A

DB9*1

DB9*1

USB

USB2.0*4

USB2.0*4

USB2.0*3

Conversion Relation for STA

STA-200 = 2*STA-100
STA-400 = 6*STA-100

STA-300 = 3*STA-100
STA-500 = 10*STA-100

 

Success Stories

Downloads

Cyber Command Brochure
  1.5 MB
23 Mar 2020
Cyber Command Datasheet
  0.55 MB
09 Apr 2021
Cyber Command Case Study Smart Car Hardware Vendor
  0.34 MB
16 Mar 2021