COUNTERSNIPE WWW.COUNTERSNIPE.COM



Similar documents
Open Source in Government: Delivering Network Security, Flexibility and Interoperability

The SIEM Evaluator s Guide

Open Source Software for Cyber Operations:

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Suricata IDS. What is it and how to enable it

Security Event Management. February 7, 2007 (Revision 5)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

AANVAL SUCCESS STORIES

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Intrusion Detection Architecture Utilizing Graphics Processors

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

24x7 Managed Cyber Security for a Process Control Network

Meeting the Challenges of Virtualization Security

TIME TO RETHINK NETWORK SECURITY

Intelligent. Data Sheet

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Astaro Gateway Software Applications

How To Protect A Network From Attack From A Hacker (Hbss)

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Next Generation Intrusion Prevention Is So Yesterday

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Critical Security Controls

Sophos Acquires Cyberoam

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Architecture Overview

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Symantec Security Information Manager 4.8 Release Notes

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

funkwerk packetalarm NG IDS/IPS Systems

Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Implementing Cisco Intrusion Prevention System 7.0 (IPS)

Network Security Monitoring

BEGINNER S GUIDE to. Open Source Intrusion Detection Tools.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

Cisco IPS Tuning Overview

Check Point taps the power of virtualization to simplify security for private clouds

QRadar Security Intelligence Platform Appliances

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

How To Manage Sourcefire From A Command Console

How To Protect Your Cloud From Attack

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

The Advantages of Security as a Service versus On-Premise Security

Managed Security Services for Data

OKTOBER 2010 CONSOLIDATING MULTIPLE NETWORK APPLIANCES

Network Security Platform 7.5

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Intrusion Prevention System

IBM Security IBM Corporation IBM Corporation

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

A CrossTec Corporation. Instructional Setup Guide. Activeworx Security Center Quick Install Guide

CALNET 3 Category 7 Network Based Management Security. Table of Contents

APRIL 2010 HIGH PERFORMANCE INTRUSION PREVENTION SYSTEMS

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Intel Security Certified Product Specialist McAfee Network Security Platform (NSP)

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service

Intrusion Prevention System

Overview and Deployment Guide. Sophos UTM on AWS

Edge Configuration Series Reporting Overview

AVeS Cloud Security powered by SYMANTEC TM

A Guide to New Features in Propalms OneGate 4.0

Virtual Patching: a Proven Cost Savings Strategy

Unified Threat Management, Managed Security, and the Cloud Services Model

Deep Security Vulnerability Protection Summary

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

Patch and Vulnerability Management Program

PCI DSS Top 10 Reports March 2011

NAC at the endpoint: control your network through device compliance

Network Security Forensics

NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez

Cisco Advanced Services for Network Security

Infrastructure for active and passive measurements at 10Gbps and beyond

Marlicia J. Pollard East Carolina University ICTN 4040 SECTION 602 Mrs. Boahn Dr. Lunsford

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

The 2014 Next Generation Firewall Challenge

Unified Threat Management Throughput Performance

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Intrusion Detection Systems (IDS)

Next-Generation Firewalls: Critical to SMB Network Security

Achieve Deeper Network Security

NETWORK FUNCTIONS VIRTUALIZATION FOR SECURITY (NFV-S)

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Network Access Control in Virtual Environments. Technical Note

AANVAL INDUSTRY FOCUS SOLUTIONS BRIEF. Aanval for Financial Services

Consolidating Multiple Network Appliances

INTRODUCTION TO FIREWALL SECURITY

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Vyatta Network OS for Network Virtualization

Configuring Virtual Switches for Use with PVS. February 7, 2014 (Revision 1)

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

APRIL 2010 HIGH PERFORMANCE NETWORK SECURITY APPLIANCES

Transcription:

COUNTERSNIPE WWW.COUNTERSNIPE.COM

COUNTERSNIPE SYSTEMS LLC RELEASE 7.0 CounterSnipe s version 7.0 is their next major release and includes a completely new IDS/IPS leveraging high performance scalability of the Ubuntu 12.04 (LTS) OS, a Suricata engine and the incorporation of the Emerging Threats ET Pro Ruleset. This new development takes CounterSnipe to the fore front of Next Generation IDS/IPS technology to address ongoing protection required by customers against Advanced Persistent Threats and Malware. Release 7.0 provides the latest research & technology required to combat the most current cyber security threats. CounterSnipe Systems LLC. All rights reserved. SURICATA Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Suricata s multi-threaded architecture can support high performance multi-core and multi-processor systems. The major benefits of a multi-threaded design is that it offers increased speed and efficiency in network traffic analysis and can also help divide up the IDS/IPS workload based on where the processing needs are. The engine is built to utilize the increased processing power offered by the latest multi-core CPU chip sets. Suricata is Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF). ETPRO RULESET Emerging Threats developed comprehensive IDS/IPS rules to combat Advanced persistent Threats & Malware. The ETPro Ruleset Research Team pushes ruleset updates daily, not weekly or less like most vendors to CounterSnipe engines. Daily Updates with ETPro Ruleset averaging 20 to 30 new malware and vulnerability rules each day gives customers more than twenty times the rules each week than any other vendor. ETPro and the ET design are trademarks of Emerging Threats Pro, LLC.

PRODUCT SET IDS/IPS CounterSnipe is Intrusion Detection and Prevention Software (IDS/IPS) with a number of additional network security management features. Once the software has been installed the CounterSnipe implementation results in a powerful multimode IDS/IPS system that can be used either in tap mode (listening passively to network traffic) or in in-line mode just like a firewall (as a gateway through which all traffic must pass). There are 3 possible software installations: 1) Standalone Active Protection System (APS) 2) Active Protection Device (APD) 3) Threat Management Console (TMC) CounterSnipe Systems LLC. All rights reserved. APS The Active Protection System (APS) offers Enterprises a combination of Asset Management, Intrusion Prevention (IDS/IPS), Network Access Control (NAC) and always-on threat protection. The integration and correlation of all of these various modules meets various security, accountability and compliance requirements. APS is a cost effective solution for organizations of all sizes as its modular approach, flexible licensing and ease of upgrading eliminates huge costs associated with dedicated appliances. Various modules from APS may be installed to create one of the desired solutions. All modules communicate with the central Management Console TMC Threat Management Center (TMC) is the GUI front end CounterSnipe Systems use to drive all the administration and configuration functions. In a multiple device deployment TMC is used to manage all of the remote devices (APDs) Active Protection Device. The actual working components of the CounterSnipe suite. In a multiple device deployment refers to remotely managed IDS/IPS devices. In a standalone single hardware system both the TMC and APD are installed on the same appliance. The workings of the system are exactly same as if the two were installed on two separate pieces of hardware.

TECHNOLOGY UBUNTU 12.04 LTS The Ubuntu Linux distribution is the CounterSnipe Systems OS of choice. Ubuntu 12.04. LTS is a long-term support release. It has continuous server hardware support improvements as well as guaranteed security and support updates until April 2017. SURICATA The Suricata engine offers increased speed and efficiency in network traffic analysis. In addition to hardware acceleration (within hardware and network card limitations), the engine is built to utilise the increased processing power offered by the latest multi-core CPU chip sets. EMERGING THREATS The ETPro Ruleset Research Team pushes ruleset updates daily, not weekly or less like most vendors. Daily Updates with ETPro Ruleset averaging 20 to 30 new malware and vulnerability rules each day gives the Countersnipe IPS more than twenty times the rules each week than any other vendor.

PRODUCT HISTORY Three consistent years of IDS/IPS innovation: H2 2013 Version 7.0.0 Suricata based IDS Engine introduced H1 2013 OS update to Ubuntu 12.04 LTS H2 2012 Always on Adaptive Alert Management H1 2012 Version 6.0.0 SNORT based IDS Engine updates H2 2011 Dual licensing; always on scanning; one click host based blocking H1 2011 Version 5.0.0 Active Protection Software (APS) released CounterSnipe Systems LLC. All rights reserved.

NEXT GENERATION IPS ROADMAP CounterSnipe has consistently developed their IPS product set since 2003 Release 7 takes their IPS technology to the next level with a Suricata based IPS engine, replacing SNORT, to deliver leading edge security capability. Exploits Ubuntu 12.04 LTS OS to deliver higher IPS throughput at NIC speed without packet drops Run multiple signature engines for the most demanding network implementations Active Customer Engagement to add new features and provide security management they want in shorter timeframes than any competitor CounterSnipe Systems LLC. All rights reserved.

PRODUCT SUPPORT & SOFTWARE MANAGEMENT CounterSnipe Systems LLC provides all customers with premium 24*7*365 online and email support from their SOC (Security Operations Centre) as standard Daily signature updates from Emerging Threats ET Pro as standard Premium 24*7*365 risk data and product updates Training workshops & onsite / in-house get to know the product sessions Consultancy / Professional Services for in-depth low level policy tuning CounterSnipe Systems LLC. All rights reserved.

DEMO S & EVALUATION How about a live demo? Register for a CounterSnipe webinar? Why not download the software and evaluate? http://www.countersnipe.com/index.php/training-and-support/75-free-eval Or contact us directly sales@countersnipe.com CounterSnipe Systems LLC. All rights reserved.

Q & A What more can we tell you about the CounterSnipe Systems LLC product set? CounterSnipe Systems LLC. All rights reserved.