Intelligent Analysis
Centralized visibility and control over your network infrastructure with
AI-powered insights.
Hydra Agent Execution
Automated technical execution via SSH/API for rapid response and
remediation.
Multi-Vendor Support
Manage Cisco, WatchGuard, Juniper, and Sophos devices from a single
interface.
Advanced Analytics
Real-time security analysis with comprehensive audit trails and compliance
reporting.
Supported Integrations
Myrmex supports a wide range of industry-standard network devices.Cisco Firepower
Type: Firewall | Connection: SSH
Cisco Switch
Type: Switch | Connection: SSH
WatchGuard Firewall
Type: Firewall | Connection: SSH
Juniper Switch
Type: Switch | Connection: SSH
Sophos Firewall
Type: Firewall | Connection: SSH
Huawei Switch
Type: Switch | Connection: SSH
FortiManager
Type: Management | Connection: SSH
FortiGate
Type: Firewall | Connection: SSH
FortiSwitch
Type: Switch | Connection: SSH
FortiWiFi
Type: Wireless | Connection: SSH
Aruba Switch
Type: Switch | Connection: SSH
Dell Switch
Type: Switch | Connection: SSH
Check Point Firewall
Type: Firewall | Connection: SSH/API
Mikrotik Switch
Type: Switch | Connection: SSH
Mikrotik Router
Type: Router | Connection: SSH
Cisco Meraki
Type: Appliance | Connection: API
UniFi Controller
Type: Controller | Connection: API
pfSense Firewall
Type: Firewall | Connection: SSH
Juniper Firewall
Type: Firewall | Connection: SSH
Palo Alto Firewall
Type: Firewall | Connection: SSH/API
Core Capabilities
1. Centralized Visibility and Integration
1. Centralized Visibility and Integration
Unified Network Dashboard
Operations Center
- Manage multiple firewalls and switches simultaneously
- Centralized view of entire network topology
- connect via SSH or API for deep system access
- Unified data flow between heterogeneous devices (e.g., Cisco & Juniper)
- Monitor port status, traffic flows, and security events in real-time
- Investigate suspicious activities across the network layer
This integration ensures that the entire network infrastructure is visible to agents, enabling data-driven decisions.
2. Audit Support and Policy Configuration
2. Audit Support and Policy Configuration
Policy & Config Management
Rule & ACL Assessment - Assess the effectiveness of firewall rules and
switch ACLs - Identify gaps, redundancies, and misconfigurations
Configuration Drift - Monitor for unauthorized changes in device
configurations - Maintain compliance with internal standards (Golden
Config) Audit & Compliance - Generate detailed audit reports for
network devices - Support internal and external security audits (PCI-DSS,
ISO 27001)
3. Response Assistance and Technical Execution
3. Response Assistance and Technical Execution
Intelligent Response
Vulnerability Audit - Audit device firmware and configurations for
known vulnerabilities - Recommend patching or mitigation strategies Risk
Mitigation - Propose segmentation change or rule hardening to reduce
attack surface - Proactive security posture improvement Integration &
Analysis - Correlate firewall logs with switch port activity for precise
threat localization - Analyze data across multiple vendors for a robust
security approach
4. Technical Execution with Hydra Agent
4. Technical Execution with Hydra Agent
Hydra Agent Execution
Configuration Management
- Apply configuration changes, VLAN changes, and rule adjustments via CLI
- Automated policy deployment with user approval
- Perform IP blocking, port shutdown, or device isolation
- Execute complex remediation scripts as per user instructions
- Execute bulk changes across multiple switches or firewalls
- Ensure consistency across the fleet
- “Dry-run” capabilities to validate commands before execution
- Increase security and reliability through controlled deployment
Hydra ensures that user strategic decisions are quickly implemented without losing control or supervision.
Getting Started
1
Connect Your Device
Onboard your Cisco, WatchGuard, Juniper, or Sophos device via SSH
credentials.
2
Discovery & Inventory
Myrmex automatically discovers interfaces, zones, and current
configurations.
3
Enable Hydra Agent
Activate the Hydra agent for automated technical execution and rapid
response capabilities.
4
Operations & Audit
Use real-time analytics to monitor traffic and enforce security policies
across your network.