• Unlock 30% growth in revenue with fully managed Single Vendor SASE 
  • Lower TCO with disruptive pricing models 
  • Deploy on-demand Hybrid Cloud Protection  
  • Scale Security capabilities with Human-Machine Teaming 
  • Access a ready to deploy global network of PoPs (Points of Presence)
 
 
  • Controls consolidation simplifying the security licensing model
  • Deploy with assurance, with a security partner you can trust 
  • On-demand Digital Forensics and Incident Response 
  • 5x more energy efficiency for scalable High-density multitenant deployments 
 

Deployment Options

Crystal Eye Cloud License 

  • Order ready to deploy a global network of Point of Presence (PoPs) straight from Red Piranha's Orchestrate 
  • 100Mbs True Security Throughput Virtualized options for partners 
  • Specialist design assistance available for provisioning 100 MB or 1 GB tenancy 

Crystal Eye SE101

  • Eliminate the expanded virtualization risk for high-density deployments with a dedicated hardware control plane 
  • Implement high speed security scanning with up to 2.4Gbps IDS/IPS throughput 

Crystal Eye 100


Crystal Eye SE100.20 Red Piranha Cloud
4 Cores, 16GB RAM, 5TB Bandwidth, 384GB Storage 

Crystal Eye SE100.30 Red Piranha Cloud  
8 Cores, 32GB RAM, 7TB Bandwidth, 512GB Storage 


  • Ready to scale, modular design to build and deploy past 100GB, for large-scale traffic monitoring and protection 
  • Customizable adapters and node controllers can be configured to manage traffic across nodes or direct from port-to-port 
  • Configurable for DoS protection profiling 
  • Custom proxy profiles for increased TLS interception and inspection capabilities 
  • Redundant cluster node failover 
  • Instant SOC capability across custom traffic types 
  • Ability to deal with elephant flows found in specific network requirements like digital media, campus, scientific research, law enforcement and mining operations 


Security Outcomes

  • Integrated Operationalized Cyber Threat Intelligence, with AAI 
  • Up to 10x Increased visibility to counter Advanced Persistent Threats (APTs) 
  • Embed security controls consolidation for Critical Infrastructure  
  • Get access to 24*7/365 Monitoring and Response capabilities. Protect, Detect, Investigate and Respond to zero-day threats, malware families and APTs with greater detection efficacy. 
  • Partner capability to confidently offer best-in-breed Threat Detection, Investigation and Response to meet the challenge of the evolving threat landscape 
  • Get Immediate SOC uplift with Detection Engineering coverage across cloud, network and endpoint. 
  • Gain real-time insights into network traffic and anomaly detection 
  • Integrated Vulnerability Management for Continuous Threat Exposure Management 
  • Protect end users from anywhere with a Managed Firewall and Secure Web Gateway 
  • SD-WAN to Apply flexible, policy-driven controls to Authenticate and Authorize 
  • Employ CASB to securely manage access to microservices across hybrid environments 
  • SD-WAN to Apply flexible, policy-driven controls to Authenticate and Authorize 
  • Reduce Engineering overheads and achieve lower Total Cost of Ownership (TCO)