Top Banner
Analyze Scale Out Big Data Open Source Wireless Extensions Collect Machine Data Cybersecurity IPS IPS Characteriscs redborder is probably the best soluon based on Open Source available on the market for managing IPS probes based on Snort, Suricata and Bro or our own redborder IPS probes. The management inherits all of our plaorm’s advantages based on Big-data, enabling larger scaling for large deployments on a global scale and applying administraon to mul-tenant technology. With redborder you can fully manage the IDS/IPS Open Sources of the organisaon, making it possible to integrate redborder IPS sensors or even Snort probes. Thanks to the informaon gathered by the probes and sensors, the security status of our organisaon can be supervised, enabling a thorough and detailed security analysis which allows for acon to be taken should possible aacks against our technology infrastructure be detected. The redborder IPS sensor has different operang modes which adapt to the requirements of the infrastructure. IDS FORWARDING This is a mode that enables you to simulate a TAP with soſtware. Traffic passes in both direcons through the two network interfaces which make up the inspecon segment and a copy of said traffic is sent to the detecon engine so that it can be analysed. IPS The device works like a standard IPS. The traffic is inspected and resent by the detecon engine only if it is established that it is not a threat. If an aack is detected, the bundle can be blocked according to the configuraon of the security policy in applicaon. The device behaves like a standard IDS network in which the specific role of one or several of the interfaces is to monitor the network traffic in order to detect malicious acvity. IDS SPAN IPS TEST If the acon to be applied when correspondence requires a signature is to reject the bundle, this is done and a “should be rejected” alert is generated. This is useful for evaluang the mode and the set of rules without affecng traffic.
2

IPS - red border · IPS IPS Characteristics redborder is probably the best solution based on Open Source available on the market for managing IPS probes based on Snort, Suricata

Dec 17, 2018

Download

Documents

dinhkhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IPS - red border · IPS IPS Characteristics redborder is probably the best solution based on Open Source available on the market for managing IPS probes based on Snort, Suricata

AnalyzeScale OutBig Data

Open Source

WirelessExtensions

CollectMachine Data Cybersecurity

IPS

IPS

Characteristics

redborder is probably the best solution based on Open Source available on the market for managing IPS probes based on Snort, Suricata and Bro or our own redborder IPS probes. The management inherits all of our platform’s advantages based on Big-data, enabling larger scaling for large deployments on a global scale and applying administration to multi-tenant technology. With redborder you can fully manage the IDS/IPS Open Sources of the organisation, making it possible to integrate redborder IPS sensors or even Snort probes.

Thanks to the information gathered by the probes and sensors, the security status of our organisation can be supervised, enabling a thorough and detailed security analysis which allows for action to be taken should possible attacks against our technology infrastructure be detected.

The redborder IPS sensor has different operating modes which adapt to the requirements of the infrastructure.

IDS FORWARDING This is a mode that enables you to simulate a TAP with software. Traffic passes in both directions through the two network interfaces which make up the inspection segment and a copy of said traffic is sent to the detection engine so that it can be analysed.

IPS The device works like a standard IPS. The traffic is inspected and resent by the detection engine only if it is established that it is not a threat. If an attack is detected, the bundle can be blocked according to the configuration of the security policy in application.

The device behaves like a standard IDS network in which the specific role of one or several of the interfaces is to monitor the network traffic in order to detect malicious activity.

IDS SPAN

IPS TEST If the action to be applied when correspondence requires a signature is to reject the bundle, this is done and a “should be rejected” alert is generated. This is useful for evaluating the mode and the set of rules without affecting traffic.

Page 2: IPS - red border · IPS IPS Characteristics redborder is probably the best solution based on Open Source available on the market for managing IPS probes based on Snort, Suricata

redborder.comgithub.com/redborder

@redborder

Dashboards

Installation modes

Can be installed in devices which meet some minimum connectivity and capacity requirements.

Bare metal

Equally, a previously-prepared image can be used to install in OpenStack (vIPS VNF) cloud deployments.

Virtual on cloud

We have devices which are specifically designed for inspecting different volumes of information and which are equipped with frontal connectivity and bypass by hardware.

redborder appliances

Can be installed in virtualized systems without any special adaptation in IDS SPAN mode. In other modes, the virtual networks which make up the segment must be isolated.

Virtual on-premise

Advantages

Centralised, hierarchic and multi-domain administration for local Snort deployments.

Real time, scalability, multi-tenant, Cloud ready and Stack based on BigData.

Integrated graphic management, simple and user friendly.

Unbeatable ROI.

Models with integrated SSL traffic inspection.