Skip to main content

Kratos Networks Releases New Version of NeuralStar

Kratos Networks announced the new release of its flagship network management and situational awareness product, NeuralStar, that adds anomaly analysis and event pattern recognition capabilities.

The new release also provides real-time intelligence for ensuring optimal performance, increased availability, enhanced cybersecurity protection and informed decision-making.

NeuralStar monitors events that may impact network availability, performance, security, or quality of service, providing network operators with a single situational awareness dashboard. By collecting performance data from all network hardware, applications, management and security systems, operators can identify health and status issues, make adjustments to maintain network throughput, and minimize anomalies such as congestion and latency.

"With new security threats, constant change, and accelerated network growth, it is vital to have clear insight into the behavior of IT infrastructure to effectively manage, operate and secure today’s enterprise networks," said Michael Smith, Sr. VP of Enterprise Technology at Kratos Networks. "The new release of NeuralStar helps operators detect network anomalies and recognize event patterns more quickly to simplify and automate the process of pro-actively managing end-to-end performance across the enterprise."

Unlike the manual threshold approach used by many enterprises today, NeuralStar enables network operators to rapidly isolate and troubleshoot performance bottlenecks and suspicious activity on the network. Using a wizard-driven interface, network managers can automatically create dynamic activity-baselines across the IT infrastructure. Dynamic thresholds can also be set above and below baseline values so that alerts are received if network traffic levels spike or drop dramatically, so performance and security issues can be rapidly detected and resolved before any impact occurs.

With the new release, enterprise management capabilities have been enhanced to enable operators to quickly adapt to security threats and performance issues across distributed sites. NeuralStar enables the centralized management of user authentication, rules, and device groupings across regional and local sites. In addition, dynamic monitoring of remote sites reduces the number of false alarms and accelerates the remediation process.

The Latest

64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...

Cloud computing has transformed how we build and scale software, but it has also quietly introduced one of the most persistent challenges in modern IT: cost visibility and control ... So why, after more than a decade of cloud adoption, are cloud costs still spiraling out of control? The answer lies not in tooling but in culture ...

CEOs are committed to advancing AI solutions across their organization even as they face challenges from accelerating technology adoption, according to the IBM CEO Study. The survey revealed that executive respondents expect the growth rate of AI investments to more than double in the next two years, and 61% confirm they are actively adopting AI agents today and preparing to implement them at scale ...

Image
IBM

 

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...

Kratos Networks Releases New Version of NeuralStar

Kratos Networks announced the new release of its flagship network management and situational awareness product, NeuralStar, that adds anomaly analysis and event pattern recognition capabilities.

The new release also provides real-time intelligence for ensuring optimal performance, increased availability, enhanced cybersecurity protection and informed decision-making.

NeuralStar monitors events that may impact network availability, performance, security, or quality of service, providing network operators with a single situational awareness dashboard. By collecting performance data from all network hardware, applications, management and security systems, operators can identify health and status issues, make adjustments to maintain network throughput, and minimize anomalies such as congestion and latency.

"With new security threats, constant change, and accelerated network growth, it is vital to have clear insight into the behavior of IT infrastructure to effectively manage, operate and secure today’s enterprise networks," said Michael Smith, Sr. VP of Enterprise Technology at Kratos Networks. "The new release of NeuralStar helps operators detect network anomalies and recognize event patterns more quickly to simplify and automate the process of pro-actively managing end-to-end performance across the enterprise."

Unlike the manual threshold approach used by many enterprises today, NeuralStar enables network operators to rapidly isolate and troubleshoot performance bottlenecks and suspicious activity on the network. Using a wizard-driven interface, network managers can automatically create dynamic activity-baselines across the IT infrastructure. Dynamic thresholds can also be set above and below baseline values so that alerts are received if network traffic levels spike or drop dramatically, so performance and security issues can be rapidly detected and resolved before any impact occurs.

With the new release, enterprise management capabilities have been enhanced to enable operators to quickly adapt to security threats and performance issues across distributed sites. NeuralStar enables the centralized management of user authentication, rules, and device groupings across regional and local sites. In addition, dynamic monitoring of remote sites reduces the number of false alarms and accelerates the remediation process.

The Latest

64% of enterprise networking teams use internally developed software or scripts for network automation, but 61% of those teams spend six or more hours per week debugging and maintaining them, according to From Scripts to Platforms: Why Homegrown Tools Dominate Network Automation and How Vendors Can Help, my latest EMA report ...

Cloud computing has transformed how we build and scale software, but it has also quietly introduced one of the most persistent challenges in modern IT: cost visibility and control ... So why, after more than a decade of cloud adoption, are cloud costs still spiraling out of control? The answer lies not in tooling but in culture ...

CEOs are committed to advancing AI solutions across their organization even as they face challenges from accelerating technology adoption, according to the IBM CEO Study. The survey revealed that executive respondents expect the growth rate of AI investments to more than double in the next two years, and 61% confirm they are actively adopting AI agents today and preparing to implement them at scale ...

Image
IBM

 

A major architectural shift is underway across enterprise networks, according to a new global study from Cisco. As AI assistants, agents, and data-driven workloads reshape how work gets done, they're creating faster, more dynamic, more latency-sensitive, and more complex network traffic. Combined with the ubiquity of connected devices, 24/7 uptime demands, and intensifying security threats, these shifts are driving infrastructure to adapt and evolve ...

Image
Cisco

The development of banking apps was supposed to provide users with convenience, control and piece of mind. However, for thousands of Halifax customers recently, a major mobile outage caused the exact opposite, leaving customers unable to check balances, or pay bills, sparking widespread frustration. This wasn't an isolated incident ... So why are these failures still happening? ...

Cyber threats are growing more sophisticated every day, and at their forefront are zero-day vulnerabilities. These elusive security gaps are exploited before a fix becomes available, making them among the most dangerous threats in today's digital landscape ... This guide will explore what these vulnerabilities are, how they work, why they pose such a significant threat, and how modern organizations can stay protected ...

The prevention of data center outages continues to be a strategic priority for data center owners and operators. Infrastructure equipment has improved, but the complexity of modern architectures and evolving external threats presents new risks that operators must actively manage, according to the Data Center Outage Analysis 2025 from Uptime Institute ...

As observability engineers, we navigate a sea of telemetry daily. We instrument our applications, configure collectors, and build dashboards, all in pursuit of understanding our complex distributed systems. Yet, amidst this flood of data, a critical question often remains unspoken, or at best, answered by gut feeling: "Is our telemetry actually good?" ... We're inviting you to participate in shaping a foundational element for better observability: the Instrumentation Score ...

We're inching ever closer toward a long-held goal: technology infrastructure that is so automated that it can protect itself. But as IT leaders aggressively employ automation across our enterprises, we need to continuously reassess what AI is ready to manage autonomously and what can not yet be trusted to algorithms ...

Much like a traditional factory turns raw materials into finished products, the AI factory turns vast datasets into actionable business outcomes through advanced models, inferences, and automation. From the earliest data inputs to the final token output, this process must be reliable, repeatable, and scalable. That requires industrializing the way AI is developed, deployed, and managed ...