What issues does Congruity Inspector identify?
Congruity Inspector highlights all communication Vectors on the network, representing any network path in or out of the protected network. A user can easily identify which vectors are legitimate business and which are not and eliminate them. Congruity Inspector operates on the basis of monitoring and collecting every traffic flow (TCP, UDP & ICMP protocols) entering and leaving the protected network over a 7 day period, categorizing this information in a logical, easy-to-understand format. Findings include comprehensive baseline metrics to help users understand how usage impacts operations.