Netapprove
Product Architecture

How Netapprove actually works.

Netapprove is one binary box (or VM) that ingests off a SPAN port, lands telemetry in an open columnar lake, runs a fleet of ML detectors against it, asks an LLM to triage what survives, and ships actions to your existing infrastructure when the AI is confident.

Deployment

Passive by design. Zero risk, full visibility.

Netapprove is not an inline appliance. No cables to cut, no routing to change. The sensor receives traffic over a SPAN port or a Network TAP, which copy every packet crossing the core switch and hand it to Netapprove read-only.

The result is a deployment that has no impact on production: if the sensor dies, real traffic keeps flowing, no packet drops, no added latency, no chance the AI will accidentally block legitimate traffic. Every response action goes out through external SOAR adapters (firewall API, switch ACL, RADIUS CoA), never through the sensor itself.

  • Out-of-band. The sensor sits next to the switch, not on the critical path, Netapprove downtime is not network downtime.
  • Read-only ingestion. Nothing is injected, modified, or replied to. Audit-friendly for regulated environments (PCI-DSS, ISO 27001, PDPA).
  • Line-rate. 1G to 100G on commodity NICs via AF_PACKET, DPDK, or Zeek 8 cluster mode, throughput scales with hardware, not licensing.
  • Multi-segment fan-in. Aggregate mirrors from many VLANs, DMZ, and OT segments into one sensor; Zeek tags keep context separate automatically.
  • Encrypted-aware. Flow metadata, SNI, JA3/JA4 fingerprints, and certificate chains, full TLS posture without decryption.
  • Forward-able. Stream raw PCAP and Zeek logs to your SIEM, data lake, or XDR in parallel, Netapprove never holds your telemetry hostage.
01 · Sense
SPAN / TAP Zeek 8.1 Suricata-compatible community-id correlation key
02 · Lake
Parquet on disk DuckDB query engine Hive-partitioned (dt=YYYY-MM-DD) 30+ logical tables
03 · Learn
Per-host peer baseline Service baseline Time-series anomaly Sequence model Graph anomaly Identity anomaly Ext. reputation Meta-scorer
04 · Reason
Claude Opus reasoner Triage narrative + confidence MITRE ATT&CK auto-tagging Kill-chain stitching
05 · Act
edge_fw switch_acl radius_coa dns_sink local_rsp ssc_alert
06 · Surface
FastAPI + Jinja React + Vite SPA Cytoscape graph globe.gl 3D RBAC + audit log
Where Netapprove fits

Netapprove vs. legacy NDR vs. SIEM-only.

The market splits into rule engines, log warehouses, and a few AI-first tools. Here’s how Netapprove compares on the dimensions that move the needle.

Capability Signature IDS / Legacy NDR SIEM-only SRAN Netapprove
Detects unknown / zero-day No, needs a rule Only if you wrote the query Yes, AI baseline
False positive rate High (rule pollution) Whatever your queries return LLM-triaged, auto-closed
Time to first value Weeks of tuning Months of onboarding Hours after SPAN cable
Active response built in No No (needs SOAR add-on) 5 adapters, RBAC, audit
Explainable per-incident A rule ID Whatever you logged LLM narrative + MITRE tag
Storage cost at scale Vendor-locked $$$ per GB/day Open Parquet, your disk
Air-gap / on-prem deploy Usually Cloud-tilted First-class
Deployment

One box. One cable. One afternoon.

Mount the sensor

Bare-metal, VM, or appliance. Debian 13 base. 4 cores / 8 GB RAM is enough for a small site.

Mirror your traffic

SPAN or TAP into one of the monitor NICs. Netapprove never injects packets, 100% passive.

Learn for 24h

The ensemble warm-starts from sensible priors and re-baselines on your traffic over the first day.

Connect adapters

Wire in your firewall, switch, RADIUS, and DNS resolver. Keep adapters in dry-run while you watch.

Promote to live

Per-adapter, per-severity. Roll back any time. Audit log captures every decision.

Tune zero rules

You don’t. Analyst feedback flows back into the meta-scorer. The model gets smarter with use.

Frequently Asked

Common questions, straight answers.

Does Netapprove use any signatures at all?

No. The detection layer is exclusively ML and statistical baselines. We optionally enrich with threat intel feeds (KEV, NVD, IP reputation) at scoring time, but those are evidence, not triggers.

How do you keep false positives down?

Three layers: (1) the ensemble’s meta-scorer suppresses single-signal noise, (2) the LLM reasoner re-reads each surviving alert against the host’s history and auto-closes confirmed-benign ones with a written justification, (3) analyst feedback re-weights the meta-scorer over time.

What about encrypted traffic?

Netapprove does not break TLS. The 7-layer ensemble derives strong signal from JA4/JA4S fingerprints, certificate posture, beacon timing, packet-size sequences, peer history, and SNI, all of which remain visible regardless of payload encryption.

Is the LLM call sent to the cloud?

Triage by default uses the Claude API. For air-gapped or sovereign deployments we support an on-prem reasoner endpoint, the rest of the stack runs entirely on your hardware.

Can I export to my SIEM?

Yes. Every incident, action, and audit record is available as JSON, syslog (CEF / LEEF), and as a Parquet file you can pull with any S3-compatible client.

How is this different from Darktrace?

Conceptually similar, AI-driven NDR + autonomous response. Practically: Netapprove uses an open columnar lake (Parquet + DuckDB) instead of a black-box appliance store, an LLM reasoner that explains every alert, and ships with hardware adapters for the protocols Thai & ASEAN networks actually run (RADIUS CoA, common firewall families, local DNS resolvers). Plus, it’s built and supported in Thailand.

Compliance reporting?

Built-in dashboards for NIST CSF, ISO 27001, and PCI-DSS, all driven by your live telemetry. Evidence packets exportable per control.

Get a live demo on your traffic.

We’ll bring the sensor. You bring the SPAN port. 30 minutes, your network, your incidents, or your money back (it’s a free demo, so this is a low-risk offer).

Address

SRAN CyberTech
48/6 ซอยแจ้งวัฒนะ 14 แขวงทุ่งสองห้อง
เขตหลักสี่ กรุงเทพมหานคร 10210

Distribution Partner

บริษัท ทูนาเบิล โปรเจค จำกัด