Sourcefire NGIPS Intrusion Detection & Prevention

SourceFire NGIPS Intrusion Detection & Prevention

NOTE: Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources, and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion detection system (IDS) monitors and collects data from a target system that should be protected, processes and correlates the gathered information, and initiates responses when evidence of an intrusion is detected.

Today’s security needs to be effective against more advanced and determined adversaries. Achieving a defence efficacy rate of 98 to 99 per cent is considered to be among the very best, but this still means that one or two per cent of all attacks could still succeed. Worst still this one or two per cent could include the most dangerous threats. Traditional defences typically focus on the network perimeter, often blind to dangerous attacks that succeed in entering.

Using an integrated and validated architecture Warrior Networks Cyber Threat Defence Solution incorporates Cisco and Sourcefire technologies that profiles threats  which provide visibility and control throughout the enterprise.

This solution sets a new standard for advanced threat protection by integrating:

Real-time contextual awareness
Intelligent security automation
Superior performance with industry-leading network intrusion prevention

No other solution on the market today offers the visibility, automation, flexibility, and scalability required to protect today’s dynamic network environments against increasingly sophisticated threats.

Sourcefire NGIPS allows you to address the full attack continuum – before, during, and after an attack. No other IPS solution currently provides more visibility into your environment. No other IPS solution provides more threat detection. And no other IPS solution provides the ability to track attacks through your network.

Sourcefire NGIPS features include:

Real-time contextual awareness. See and correlate extensive amounts of event data related to IT environments—applications, users, devices, operating systems, vulnerabilities, services, processes, network behaviors, files, and threats.

Intelligent security automation. Significantly lower total cost of ownership and enhance your ability to keep pace with changing environments. Take advantage of automated event impact assessment, IPS policy tuning, policy management, network behavior analysis, and user identification.

High performance and scalability. Gain high performance and scalability with purpose-built appliances that incorporate a low-latency, single-pass design.

Optional application control, URL filtering, and advanced malware protection (AMP). Reduce the surface area of attack through precise control of more than 3000 applications and hundreds of millions of URLs in over 80 categories. Discover, track, and block the progression of suspect files and malware to prevent the spread of outbreaks and reinfection.














No comments yet.