Intelligent Analysis
Centralized visibility and control over your network infrastructure with
AI-powered insights.
Hydra Agent Execution
Automated technical execution via SSH/API for rapid response and
remediation.
Multi-Vendor Support
Manage Cisco, WatchGuard, Juniper, and Sophos devices from a single
interface.
Advanced Analytics
Real-time security analysis with comprehensive audit trails and compliance
reporting.
Supported Integrations
Myrmex supports a wide range of industry-standard network devices.Cisco Firepower
Type: Firewall | Connection: SSH
Cisco Switch
Type: Switch | Connection: SSH
WatchGuard Firewall
Type: Firewall | Connection: SSH
Juniper Switch
Type: Switch | Connection: SSH
Sophos Firewall
Type: Firewall | Connection: SSH
Huawei Switch
Type: Switch | Connection: SSH
FortiManager
Type: Management | Connection: SSH
FortiGate
Type: Firewall | Connection: SSH
FortiSwitch
Type: Switch | Connection: SSH
FortiWiFi
Type: Wireless | Connection: SSH
Aruba Switch
Type: Switch | Connection: SSH
Dell Switch
Type: Switch | Connection: SSH
Check Point Firewall
Type: Firewall | Connection: SSH/API
Mikrotik Switch
Type: Switch | Connection: SSH
Mikrotik Router
Type: Router | Connection: SSH
Cisco Meraki
Type: Appliance | Connection: API
UniFi Controller
Type: Controller | Connection: API
pfSense Firewall
Type: Firewall | Connection: SSH
Juniper Firewall
Type: Firewall | Connection: SSH
Palo Alto Firewall
Type: Firewall | Connection: SSH/API
Core Capabilities
1. Centralized Visibility and Integration
1. Centralized Visibility and Integration
Unified Network Dashboard
Operations Center
- Manage multiple firewalls and switches simultaneously
- Centralized view of entire network topology
- connect via SSH or API for deep system access
- Unified data flow between heterogeneous devices (e.g., Cisco & Juniper)
- Monitor port status, traffic flows, and security events in real-time
- Investigate suspicious activities across the network layer
This integration ensures that the entire network infrastructure is visible to agents, enabling data-driven decisions.
2. Audit Support and Policy Configuration
2. Audit Support and Policy Configuration
Policy & Config Management
Rule & ACL Assessment - Assess the effectiveness of firewall rules and
switch ACLs - Identify gaps, redundancies, and misconfigurations
Configuration Drift - Monitor for unauthorized changes in device
configurations - Maintain compliance with internal standards (Golden
Config) Audit & Compliance - Generate detailed audit reports for
network devices - Support internal and external security audits (PCI-DSS,
ISO 27001)
3. Response Assistance and Technical Execution
3. Response Assistance and Technical Execution
Intelligent Response
Vulnerability Audit - Audit device firmware and configurations for
known vulnerabilities - Recommend patching or mitigation strategies Risk
Mitigation - Propose segmentation change or rule hardening to reduce
attack surface - Proactive security posture improvement Integration &
Analysis - Correlate firewall logs with switch port activity for precise
threat localization - Analyze data across multiple vendors for a robust
security approach
4. Technical Execution with Hydra Agent
4. Technical Execution with Hydra Agent
Hydra Agent Execution
Configuration Management
- Apply configuration changes, VLAN changes, and rule adjustments via CLI
- Automated policy deployment with user approval
- Perform IP blocking, port shutdown, or device isolation
- Execute complex remediation scripts as per user instructions
- Execute bulk changes across multiple switches or firewalls
- Ensure consistency across the fleet
- “Dry-run” capabilities to validate commands before execution
- Increase security and reliability through controlled deployment
Hydra ensures that user strategic decisions are quickly implemented without losing control or supervision.
Getting Started
Enable Hydra Agent
Activate the Hydra agent for automated technical execution and rapid
response capabilities.