Analyze Scale Out Big Data Open Source Wireless Extensions Collect Machine Data Cybersecurity IPS IPS Characteriscs redborder is probably the best soluon based on Open Source available on the market for managing IPS probes based on Snort, Suricata and Bro or our own redborder IPS probes. The management inherits all of our plaorm’s advantages based on Big-data, enabling larger scaling for large deployments on a global scale and applying administraon to mul-tenant technology. With redborder you can fully manage the IDS/IPS Open Sources of the organisaon, making it possible to integrate redborder IPS sensors or even Snort probes. Thanks to the informaon gathered by the probes and sensors, the security status of our organisaon can be supervised, enabling a thorough and detailed security analysis which allows for acon to be taken should possible aacks against our technology infrastructure be detected. The redborder IPS sensor has different operang modes which adapt to the requirements of the infrastructure. IDS FORWARDING This is a mode that enables you to simulate a TAP with soſtware. Traffic passes in both direcons through the two network interfaces which make up the inspecon segment and a copy of said traffic is sent to the detecon engine so that it can be analysed. IPS The device works like a standard IPS. The traffic is inspected and resent by the detecon engine only if it is established that it is not a threat. If an aack is detected, the bundle can be blocked according to the configuraon of the security policy in applicaon. The device behaves like a standard IDS network in which the specific role of one or several of the interfaces is to monitor the network traffic in order to detect malicious acvity. IDS SPAN IPS TEST If the acon to be applied when correspondence requires a signature is to reject the bundle, this is done and a “should be rejected” alert is generated. This is useful for evaluang the mode and the set of rules without affecng traffic.