CNAM Architecture

CNAM brings extreme flexibility and scalability into your security infrastructure. With its distinguished component blocks, CNAM can be deployed effortlessly into your organisation.


Ease of deployment is one of the primary design goals of the service. CNAM deployments are easy to design and offer several customisation options. CNAM provides some key benefits for system architects.

  • CNAM is able to deploy in a varitey of network types and conditions
  • It is able to offer virtualised deployments for smaller requirements
  • For medium and small enterprises, CNAM components can be consolidated
  • Clustering features allow CNAM to scale seamlessly
  • CNAM offers scalability at all levels with a single threat management window

A large number of complex deployments are delayed or fail due to the inability of a system to adapt to the environment. CNAM is different, it is able to comply with the demands of the architecture and still deliver value to its customers. CNAM provides highly effective detection profiles for attacks from the internal and the external networks. CNAM allows a large amount of customisation in attack detection modules across deployment architectures.

Soft Appliances


CNAM is uniquely positioned to provide complete accessibility and significantly lower the entry barrier for its customers. The internal architectures were changed substantially to make the system install on generic hardware. Now CNAM can be installed on any hardware within minutes, which allow customers to induct stock hardware into CNAM clusters. CNAM currently supports the following deployment models:

  • Hardware Appliances - NETMONASTERY ships hardware appliances to customers who would like to ensure that support and benchmarking is delivered through CNAM.
  • Soft Appliances - Customers can choose to setup CNAM on existing hardware, CNAM provides a simple initial installer with support to kick start your threat management system.
  • Virtual Appliances - CNAM also deploys in the virtualised environment, it is able to work with cloud operators and provide threat detection as a pluggable add-on.

CNAM is used by several cloud and hosting providers around the globe as threat management platform for their critical infrastructure. Read more about our datacenter alliances.

Hardware sizing and distribution


All CNAM deployments are different, therefore they are faced with unique design challenges. One such challenge is the size of the deployment. Since security is an equal requirement across enterprises, CNAM is built to provide solutions to customers of all sizes. However, there are a few basic options one needs to consider during the design phase.

  • CNAM needs to deploy two components on the customer network viz. the IDD and the NAG (read How it works).
  • Both these components can be deployed on a single hardware, if the traffic utilisation is limited and the hardware used is capable.
  • Alternately, both these components can be distributed into two different systems if the traffic utilisation is heavy.
  • Moreover, each of these components can be further distributed into a cluster to fit larger requirements.

Contact Us to get personalised support in building up a solution design just for you, we will understand your requirements and recommend the best CNAM plan you could use and also recommend the right hardware required to deploy.

© 2015-2016 All Rights Reserved. NETMONASTERY™ and CNAM™ is a registered trademark of NETMONASTERY NSPL.