You don't know what's on your network.
That's not a criticism. It's just true.
Most IT teams inherit infrastructure. Devices accumulate. VLANs multiply. Nobody documents as they go. And somewhere in that mess, there are security risks, devices nobody can name, and traffic patterns nobody's looked at in years.
Omega changes that.
What we do.
We drop a sensor onto your network. It listens. You get answers.
Our network discovery platform uses a small physical basic or advanced sensor, that connects passively to your infrastructure via a SPAN port. No active scanning. No disruption. Nothing touches your devices.
Over 24 to 48 hours, the sensor observes everything passing through your network segment. Every device. Every connection. Every protocol. Every anomaly.
Then we give you a report that tells you exactly what you own, what it's doing, and what you need to fix.
What you get.
One report. Every device. No guesswork.
Each report contains six sections:
Device Register. Every device found, with its IP address, MAC address, manufacturer, hostname, role, open ports, data volumes, and first and last seen timestamps. You know exactly what's on each segment, what it's called, and what it's been doing.
Communication Map. Every connection between devices with direction, protocol, bandwidth, and session count. You see what's talking to what, how much data is moving, and whether anything is communicating where it shouldn't.
Services and Software. Detected protocols, DNS queries, HTTP user agents, TLS fingerprints, and service summaries per device. Each protocol gets a risk classification and a clear recommendation.
Security Alerts. IDS alerts triggered during the capture period, rated by severity. Each alert includes the source device, destination, and a plain-English recommendation.
Risk Assessment. Per-device risk scoring based on observed behaviour. Every device gets a score, a risk level, and prioritised remediation steps.
Raw Data. The full aggregated connection dataset from OpenSearch, available for your own analysis or integration into your existing tools.
How it works.
Three steps. No disruption.
Step 1: Scope the engagement.
We agree which VLANs to cover and what detail level you need. Discovery period, additional fields, active scanning add-ons, integration with your existing CMDB. We scope it to your requirements.
Step 2: Deploy our sensor.
We ship or deploy a basic or advanced sensor to your site. It connects via SPAN port mirror. Passive capture only, no active scanning, nothing touches your devices. It runs for the agreed capture period.
Step 3: You get your report.
24 to 48 hours after deployment, you receive a fully formatted discovery report. Every device inventoried. Every connection mapped. Every alert explained. Every risk scored and prioritised.
What this actually finds.
Things your team didn't know to look for.
In a real 24-hour capture on a surveillance VLAN in our lab, our basic sensor found:
- A Hikvision camera making external DNS queries to Google Public DNS at 8.8.8.8. IoT devices should not be doing this. It's a potential data exfiltration vector.
- A camera making an unexpected HTTPS connection to the Fortinet management interface on a different VLAN. That's cross-VLAN traffic that had no business being there.
- Two devices with no hostnames registered in DNS. Nobody knew what they were.
- The overall risk score was low. The VLAN was well-segmented. But without a passive discovery run, those two medium-severity alerts would have gone unnoticed indefinitely.
This is what you find when you actually look.
Pricing (NZD).
Per VLAN. No surprises.
Each discovery engagement is priced per VLAN or subnet.
Upfront (per VLAN): $2,250
Covers sensor deployment, scoping, report generation, and templating for your environment.
Basic Sensor monitoring: $250/month
Ongoing passive WiFi monitoring for a single VLAN. Alerts and monthly summary reporting.
Advanced Sensor monitoring: $450/month
Everything in Basic, plus additional bandwidth and dedicated ethernet.
For a 16-VLAN environment, the upfront cost is $33,000 (based on our standard package). That funds full documentation of your network from day one.
Most organisations start with a full discovery pass across their environment, then move to ongoing monitoring on the segments that warrant it. We recommend one sensor per switch stack for full coverage.
Download the datasheet.
The bottom line.
You manage what you know about. You can't fix what you haven't seen.
Omega gives you a complete, verified picture of what's on each segment of your network, what it's doing, and where the risks are. In 48 hours, without touching a single device.
If you've never run a passive discovery on your infrastructure, you should.