Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
CounterSnipe – Intelligent Network Security <ul><li>What is it? </li></ul><ul><li>Countersnine is Intrusion Prevention (ID...
CounterSnipe – Intelligent Network Security <ul><li>How Does it work?  </li></ul><ul><li>Three Steps </li></ul><ul><li>Ste...
CounterSnipe – Intelligent Network Security <ul><li>How Does it work?  </li></ul><ul><li>Three Steps </li></ul><ul><li>Ste...
CounterSnipe – Intelligent Network Security <ul><li>How Does it work?  </li></ul><ul><li>Three Steps </li></ul><ul><li>Ste...
CounterSnipe – Intelligent Network Security How it   integrates with your existing infrastructure  CounterSnipe Active Pro...
CounterSnipe – Security Management Who needs it? Every business with multiple users/computers on the network.  Here are so...
CounterSnipe – Intelligent Network Security <ul><li>How to evaluate and buy? </li></ul><ul><li>Contact our international p...
Upcoming SlideShare
Loading in …5
×

CounterSnipe Network Security

357 views

Published on

CounterSnipe Intelligent Network Security

  • Hi there! Get Your Professional Job-Winning Resume Here - Check our website! http://bit.ly/resumpro
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

CounterSnipe Network Security

  1. 1. CounterSnipe – Intelligent Network Security <ul><li>What is it? </li></ul><ul><li>Countersnine is Intrusion Prevention (IDS/IPS) network security system for protecting IT infrastructures from spyware, malware, unauthorized access, vulnerability exploit attacks and for meeting various regulatory compliance. </li></ul>Cloud Always-ON detection of your network assets
  2. 2. CounterSnipe – Intelligent Network Security <ul><li>How Does it work? </li></ul><ul><li>Three Steps </li></ul><ul><li>Step 1: Collect information about the network to be protected ie </li></ul><ul><li>2000 pcs/servers </li></ul><ul><li>50 key applications </li></ul><ul><li>Various Vulnerabilities </li></ul><ul><li>Various Open Ports </li></ul>
  3. 3. CounterSnipe – Intelligent Network Security <ul><li>How Does it work? </li></ul><ul><li>Three Steps </li></ul><ul><li>Step 2: Detect unauthorized or malicious activity, policy violations and threats on the network with full detail of where the attack originated and its destination. Example triggers; </li></ul><ul><li>MP3 file being transferred outbound </li></ul><ul><li>Access to Porn-Sports-Gambling site designed to by pass restrictions </li></ul><ul><li>Microsoft Picture Pusher ActiveX Cross Site File Upload Attack </li></ul>
  4. 4. CounterSnipe – Intelligent Network Security <ul><li>How Does it work? </li></ul><ul><li>Three Steps </li></ul><ul><li>Step 3: Correlate all that’s detected in step 2 with the network assets discovered in step 1, and do: </li></ul><ul><li>Log, block and alert upon any violations </li></ul><ul><li>Constantly monitor the network for new hosts and alert on discovering new ones. </li></ul><ul><li>Actively scan a newly discovered host and alert about its current state, ie open ports and applications. </li></ul><ul><li>Continuously keep detecting and updating the information about the network and continuously adjust the protection accordingly </li></ul>
  5. 5. CounterSnipe – Intelligent Network Security How it integrates with your existing infrastructure CounterSnipe Active Protection Appliances (APDs) deployed in three different positions on a network
  6. 6. CounterSnipe – Security Management Who needs it? Every business with multiple users/computers on the network. Here are some of the reasons why organizations have chosen CounterSnipe: <ul><li>For audit and PCI compliance; PCI-DSS 11.2 requires companies to implement IDS/IPS </li></ul><ul><li>To protect web applications accessed by external users </li></ul><ul><li>To protect and be accountable for third party access to their networks </li></ul><ul><li>To protect their businesses from network based spyware/malware attacks </li></ul><ul><li>To monitor and enforce various resource access policies </li></ul><ul><li>To augment other security measures such as anti-virus and firewall </li></ul>
  7. 7. CounterSnipe – Intelligent Network Security <ul><li>How to evaluate and buy? </li></ul><ul><li>Contact our international partner in your country </li></ul><ul><li>Contact [email_address] </li></ul><ul><li>Thank You </li></ul>

×