fbpx Skip to main content

Pendragon™

GREATER SECURITY. BETTER THROUGHPUT.

Pendragon™ is the all-in-one solution that empowers you with total network visibility through an intuitive, easy-to-use hardware interface, giving you the ability to understand and command your local network throughput and security for the very first time.

TAKE TOTAL CONTROL OF YOUR NETWORK

Welcome to Pendragon™, an SD-WAN-enabled, LEO-ready Next Generation Cyber Security and bandwidth management platform utilizing AI to monitor, command, and protect network throughput in real time.

Pendragon™ works across terrestrial and space-based single, multi-use, and hybrid networks to provide fully transparent, real-time deep network inspection and segmentation that identifies, classifies, and inventories all connected users and devices. It ensures cybersecurity risks are being appropriately identified, addressed, and remediated with minimal action requirements.

HOW IT WORKS

Pendragon operates on three core principles:

Gaining NETWORK ACCESS CONTROL (NAC) through deep-network inspection and segmentation that identifies, classifies, and inventories all connected users and devices to ensure total control of who is permitted on the network and what they can do.

Enabling THROUGHPUT FLOW COMMAND by understanding current and historic network utilization through intelligent on-demand control and machine learning, providing granular prioritization by network, user, or device.

NEXT GENERATION CYBER SECURITY through Pendragon’s application-aware detection and intrusion prevention system designed to detect, log, and stop malicious attacks in real-time.

At the heart of Pendragon™ is Datadragon®, our award-winning application, which utilizes passive and active monitoring techniques to provide unparalleled real-time flow visibility. Pendragon™ also discovers managed and unmanaged devices connecting to your heterogeneous network infrastructure and auto-classifies them using a multi-dimensional technology to identify device function, type, operating system (including version), vendor, and model.

The Pendragon™ platform operates as a network agnostic device that can be integrated and scaled from a local network controller to a full SD-WAN solution. Deploying Pendragon™ gives you the ability to help detect imminent attacks and implement device identity, traffic visibility, context-aware security policies, and dynamic network segmentation to stop them as devices move and networks change.

UNRIVALED CERTAINTY™

IS ONLY A CLICK AWAY

Contact Us