FVDR Architecture Guide
Scalable, resilient architecture for forensically validated security
FVDR Architecture Layers
Collection Layer
Hardware-based packet acquisition ensuring zero packet loss
Processing Layer
Real-time analysis and forensic validation of network traffic
Storage Layer
Compressed and encrypted storage with chain of custody
Platform Layer
Unified security platform integrating all services
Data Flow & Processing Pipeline
Ingestion
Network TAPs
Line-rate capture
Processing
FVDR Engine
Real-time analysis
Validation
Forensic Check
Evidence creation
Continuous Storage
90+ days of full PCAP with compression
Alert Generation
Validated alerts with forensic evidence
Deployment Models
Single Site Deployment
Ideal for single location organizations
- ✓1-2 FVDR sensors
- ✓Local storage array
- ✓Direct TAP connections
- ✓30-90 day retention
Multi-Site Enterprise
Distributed architecture for multiple locations
- ✓Regional sensor clusters
- ✓Centralized management
- ✓Site-to-site replication
- ✓Tiered storage strategy
Cloud-Hybrid Model
Combines on-premises and cloud resources
- ✓Local packet capture
- ✓Cloud analytics
- ✓Elastic storage scaling
- ✓Global threat intelligence
Managed SOC Service
Fully outsourced to Vigilant SOC
- ✓24/7 monitoring
- ✓Incident response team
- ✓Compliance reporting
- ✓Zero infrastructure
Integration Ecosystem
SIEM Platforms
- • Splunk
- • QRadar
- • Sentinel
- • Chronicle
Via: REST API / Syslog
SOAR Tools
- • Phantom
- • Demisto
- • Resilient
- • ServiceNow
Via: Webhooks / API
Threat Intelligence
- • MISP
- • ThreatConnect
- • Anomali
- • ThreatQ
Via: STIX/TAXII
Identity Systems
- • Active Directory
- • Okta
- • Ping
- • Azure AD
Via: SAML / OIDC
Scalability & Performance
Aggregate throughput per cluster
Storage capacity per deployment
Alert generation latency
Horizontal Scaling
- •Add sensors to increase capture capacity
- •Expand storage arrays for longer retention
- •Deploy processing nodes for faster analysis
- •Implement geo-redundancy for high availability
Security & Compliance
Security Controls
- ✓End-to-end encryption (TLS 1.3)
- ✓Hardware security modules (HSM)
- ✓Role-based access control (RBAC)
- ✓Multi-factor authentication (MFA)
- ✓Audit logging and monitoring
Compliance Standards
- ✓SOC 2 Type II certified
- ✓ISO 27001/27017/27018
- ✓HIPAA/HITECH compliant
- ✓PCI DSS Level 1
- ✓GDPR/CCPA ready