AANVAL SUCCESS STORIES



Similar documents
RAVEN, Network Security and Health for the Enterprise

QRadar SIEM 6.3 Datasheet

COUNTERSNIPE

How To Manage Sourcefire From A Command Console

IBM QRadar Security Intelligence April 2013

QRadar SIEM and FireEye MPS Integration

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

AANVAL INDUSTRY FOCUS SOLUTIONS BRIEF. Aanval for Financial Services

MANAGED SECURITY SERVICES (MSS)

SourceFireNext-Generation IPS

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Scalability in Log Management

BlackStratus for Managed Service Providers

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

Endpoint Security for DeltaV Systems

The SIEM Evaluator s Guide

MANAGED SECURITY SERVICES

End-user Security Analytics Strengthens Protection with ArcSight

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

How To Buy Nitro Security

Converting Security & Log Data into Business Intelligence: Art or Science? Phone Conference

The Virtualization Practice

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

nfx One for Managed Service Providers

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

IBM Security IBM Corporation IBM Corporation

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

IBM Security QRadar Vulnerability Manager

Find the needle in the security haystack

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

MANAGED SECURITY SERVICES (MSS)

Extreme Networks Security Analytics G2 Vulnerability Manager

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

The webinar will begin shortly

Ecom Infotech. Page 1 of 6

Getting Ahead of Malware

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

Clavister InSight TM. Protecting Values

IBM QRadar Security Intelligence Platform appliances

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Security strategies to stay off the Børsen front page

Requirements When Considering a Next- Generation Firewall

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

QRadar Security Intelligence Platform Appliances

Network Immunity Solution. Technical White paper. ProCurve Networking

What is Security Intelligence?

PCI DSS Top 10 Reports March 2011

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

SANS Top 20 Critical Controls for Effective Cyber Defense

Extreme Networks Security Analytics G2 Risk Manager

Identity Theft. Credit Card Fraud. Hackers. Terrorists. It s scary out there.

Leveraging security from the cloud

FIVE PRACTICAL STEPS

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

CA Host-Based Intrusion Prevention System r8.1

Open Source Software for Cyber Operations:

Current IBAT Endorsed Services

Preemptive security solutions for healthcare

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

VULNERABILITY MANAGEMENT

Product white paper. ROI and SIEM. How the RSA envision platform delivers an Industry-leading ROI

Attack Intelligence: Why It Matters

A Review on Network Intrusion Detection System Using Open Source Snort

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

How To Protect Your Network From Attack From A Network Security Threat

Intrusion Detection in AlienVault

Compliance Guide: PCI DSS

Discover & Investigate Advanced Threats. OVERVIEW

IBM Security X-Force Threat Intelligence

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Q1 Labs Corporate Overview

End-to-End Application Security from the Cloud

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

I D C A N A L Y S T C O N N E C T I O N

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

The Truth about False Positives

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Changing the Enterprise Security Landscape

Security Services. 30 years of experience in IT business

INTRUSION PREVENTION SYSTEMS: FIVE BENEFITS OF SECUREDATA S MANAGED SERVICE APPROACH

Suricata IDS. What is it and how to enable it

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Security Operations Metrics Definitions for Management and Operations Teams

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

IBM Security QRadar SIEM Product Overview

PCI White Paper Series. Compliance driven security

Transcription:

AANVAL SUCCESS STORIES

Aanval is used globally in over 100 countries and in every major industry, including government and defense, education, and financial. With over 6,000 customers, we wanted to highlight just a few of the many satisfied. Below are their stories. A GOVERNMENT CUSTOMER Prior to Aanval, their department was using Dragon IDS but wanted a more robust IDS supporting Snort that could help monitor and manage the network for anomalies. They did evaluate other open-source IDS vendors during the selection process. During the evaluation, he liked Aanval s performance, and price was also a big factor as they have a limited budget. With Aanval, he could now employ more Snort sensors and be able to gain more network visibility. Aanval is being used as the stand-alone IDS along with an Aanval Pro Appliance. 1. Improve operational efficiency; reduced amount of time spent on reviewing log records 2. Provides needed situational awareness and network visibility; they were able to expand the number of nodes to monitor 3. Streamline IT process of investigating anomalies in the network 1. Event Management/Collection 2. Pricing is affordable 3. Network visibility and situational awareness A BANKING CUSTOMER They were interested in Aanval because they needed a Snort management interface. There were no other products as good as Aanval, and the product that they were initially using went under and ceased to exist. ACID was too basic for them and did not have any organized tools. Tactical FLEX, Inc. Page 2! of 6!

Aanval s interface was clean and neat in comparison to other open-source solutions such as Snorby. They decided to purchase Aanval because it was the best product on the market. Aanval has a superior interface compared to other open-source products that support Snort. 1. Reduce false positives 2. Meet compliance initiatives 3. Ability to receive Snort alerts if IDS engines fail and more TOP BUSINESS BENEFITS OF AANVAL 1. Event management/collection 2. GeoLocation features 3. Automated action features; reacts to incoming events in realtime 4. Superior Snort interface compared to other open-source products A UNIVERSITY CUSTOMER Prior to Aanval, they ran an in-house Snort system, but it took too much of the IT department s time to maintain. As a result, they evaluated Aanval as a solution that could meet annual auditing requirements (having effective security in place) as well as help automate security as their IT department is seriously understaffed. They wanted a solution that required little time to maintain and monitor. Along with Aanval, Cisco and Jupiter Networks were also considered. The major reason they purchased Aanval was because its pricing beats Juniper and Cisco. 1. Improved reaction to threats; easier to detect infected computers and nasty viruses on campus and in servers 2. Meet PCI compliance initiatives 3. Network visibility through deployment of multiple sensors 4. Operational efficiency helped streamline the IT process of monitoring activities, analyzing and correlating event data, delivering security alerts, and investigating security incidents TOP BUSINESS BENEFITS OF AANVAL 1. Reliability and ease of use; Aanval is always working and easy to maintain 2. Security automation; appliance is designed as plug-and-play 3. Passed compliance requirements; the university is audited annually A FINANCIAL CUSTOMER They needed an initial IDS object that they can operate and own in-house. Previously, they were working with an MSP but wanted to be able to monitor and build their own Snort rules. Basically, they were looking for an IDS to integrate with their SIEM solution. However, they Tactical FLEX, Inc. Page 3! of 6!

have limited budget and it was mentioned that ArcSight was a hefty investment. It was not cheap and they will not recommend it to anyone because the product is just alright. They chose Aanval because it had enough GUI bits, was compliance oriented, utilizes Snort, and is affordable. Aanval was straightforward to install. 1. Provides situational awareness 2. Provides Live Correlation 3. Helps with event management and correlation 4. Event management/collection 5. Pricing A UNIVERSITY CUSTOMER This customer has been an Aanval customer for three years, first using Aanval v6 and then upgrading to Aanval v7. Their network security strategy is a Defense-in-Depth, in which they use multiple security products to monitor and manage the campus. Aanval is primarily being used for monitoring internal network in conjunction with Snort. It was first employed as an IDS; however, because Aanval provides valuable SIEM capabilities, they are now using Aanval as both an IDS and SIEM. Aanval was initially purchased because their IT department needed a graphical front-end for Snort. 1. Meet compliance initiatives 2. Snort sensor and signature management 3. Accelerate detection of attacks and anomalies 4. Manage and monitor event log data 5. Successful use with Snort to correlate realtime IDS/IPS logs 1. Scalability 2. A graphical Snort IDS and SIEM 3. Cost-effectiveness; affordable price-point, especially for university campuses who are budget conscious 4. Event management/collection 5. Realtime alerting and threat reaction Tactical FLEX, Inc. Page 4! of 6!

A FINANCIAL CUSTOMER They initially deployed Snort as their IDS but needed a more robust IDS utilizing Snort to analyze log information and to provide graphs and charts so that they can obtain a visual perspective on what is happening on their network. They evaluated other open-source solutions utilizing Snort but they chose Aanval because of its ease of deployment and the cost factor (limited budget). Aanval overall is being used as a stand-alone IDS. A SMALL BUSINESS AND E-RETAILER This customer is using Aanval for full deployment and is very happy with Aanval overall. They further mentioned that our Support department is outstanding because they have helped optimize Aanval s deployment. They purchased Aanval because they needed a more robust IDS utilizing Snort. Prior to this they were using a standard Snort interface. They evaluated Aanval for log monitoring/network traffic, packet management, anomaly detection, and to meet PCI compliance. Aanval met all of his evaluation criteria. He also found Aanval easy to use, and the installation and configuration straightforward. They did evaluate SourceFire for their data center, but they did not evaluate other vendors that belong in the mid-range scale which would compete with Aanval. Aanval was the primary product evaluated during the solution selection process. They are using Aanval as their stand-alone IDS and are not using Aanval with any other products. All information security initiatives are being managed in-house. Their network infrastructure size is pretty large as they are part of a large subsidiary of another company. 1. Improve operational efficiency; they don t have to manually review the logs 2. Meet PCI compliance initiatives: important for e-commerce sites 3. Reduce false positives 4. Provide needed situational awareness 5. Help with IT resource deficiency with security automation 6. Streamline IT process and investigating anomalies 1. Event Management/Collection 2. False positive protection 3. PCI compliance 4. Pricing is affordable 5. Offensive tools like Network Host Scanning; they used to use Nmap manually A GOVERNMENT CUSTOMER They decided to use Aanval based on the requirements of using a Snort-based security solution that provided needed commercial support. Aanval was the only product at that time that offered commercial support aside from SourceFire. They are using Aanval for central Tactical FLEX, Inc. Page 5! of 6!

management of policies and managing Snort signatures. Aanval serves the basic function overall and is serviceable. ABOUT TACTICAL FLEX, INC. Tactical FLEX, Inc. is a privately owned software development firm based in Washington, specializing in information security research, engineering, technology design, and production. With the technological development of Aanval, Tactical FLEX, Inc. has become a global provider of information security vulnerability and risk management software solutions that protect businesses and organizations. The firm also provides IT consulting and professional services. Copyright 2016 - Aanval is a product of Tactical FLEX, Inc. All Rights Reserved. All logos, trademarks, and images are property and copyright of their respective owners. This site and its products are in no way endorsed by or related to any outside entity unless specifically noted. Corporate Headquarters Contact 2049 Rd 3 SW T 800-921-2584 Suite 100 F 501-648-0875 East Wenatchee, WA 98802 https://www.aanval.com/ sales.group@tacticalflex.com support.group@tacticalflex.com Tactical FLEX, Inc. Page 6! of 6!