Quickly get to security threats in your Meraki network with CloudShark Threat Assessment. With professional threat rules applied to your capture, CloudShark lets you easily visualize where bad traffic is coming from, who is the target, and how critical it might be.
CloudShark is the world’s first web-based capture analysis tool, letting you take captures made anywhere in the world with your Meraki access points and switches and immediately begin your analysis right in your browser.
Advanced tools like graphs, HTTP object viewing, and VoIP audio playback give you everything you need to get to the root of the problem.
We needed to gain insight into our entire network, which is geographically dispersed around the world without relying on local resources... Dan Berman, IT Network Manager at 2U.
In CloudShark, every view is a URL. You can share direct links to captures, display filters, graphs, and analysis views, letting you collaborate on network captures like never before.
Let your colleagues see exactly what you see, instantly, or embed links in trouble ticket or incident response systems. There’s no need to rely on installing Wireshark or downloading or emailing captures to get things done.
And with CloudShark Threat Assessment, run professional security scans against your traffic with the click of a button.
Because CloudShark is accessed completely through a web browser, you can bring it with you wherever you need to look at a network trace. The packets stay in CloudShark so downloading large files is never an issue.
With your own CloudShark Enterprise system you can also take advantage multiple users, groups, and API tokens. CloudShark Appliance also lets you hook into LDAP/AD authentication, manage RSA keys, and lots more!
Or, sign up with your e-mail address:
Already have an account? Log in here.