Intrusion Detection con Snort, leader per la Gartner
Snort, sistema open source di network intrusion prevention sviluppato salla Sourcefire, è il più utilizzato sistema IDS/IPS a livello internazionale.
Nel Magic Quadrant Network Intrusion Prevention System della Gartner, Sourcefire si posiziona tra i leaders in base all’abilità di esecuzione e completezza di visione.
I principali punti di forza di Sourcefire, elencati dalla Gartner, sono risultati essere:
Real time Network awareness e real time user awareness
Utilizzo di Snort come motore di intrusion detection
Visibilità di ciò che sta all’interno dei rules (workflow customizzabili, supporto tecnico avanzato)
Elevata flessibilità e scalabilità
Anche in NetEye abbiamo integrato già da tempo Snort come network detection system e nell’arco del prossimo anno prevediamo di migliorare e potenziare ulteriormente il modulo di Security management per rispondere alla crescente richiesta di sicurezza da parte dei nostri clienti.
Elastic 8.16, which comes with NetEye 4.39, made Elastic Universal Profiling generally available for self-hosted installations. This means that NetEye SIEM installations will now be able to take advantage of the continuous profiling solution by Elastic. In this blogpost we'll Read More
In the first part of this series, we explored how Jira Service Management (JSM) helps streamline Incident Management, aligning with ITIL v4 best practices. Incident Management aims to restore normal service operation as quickly as possible after a disruption, ensuring Read More
Hello everyone! Today, I'd like to briefly discuss an improvement to the update and upgrade procedures that we've started to adopt with NetEye 4.39! What we wanted to improve One aspect that made quite an impact was that whenever the Read More
Hello everyone! Today, I’d like to share an exciting improvement we’ve made to the installation and upgrade procedures in NetEye, introducing a faster and more efficient parallel architecture! Why Modernize the Installation and Upgrade Processes? At Würth Phoenix, we strive Read More
Note: This description of a security analyst's daily routine is fictitious. However, the osquery examples have been tested and can therefore be used as a template for your own research. 1. Alarm Detection Today started with a high-severity alarm from our Read More