SlideShare a Scribd company logo
COUNTERSNIPE
WWW.COUNTERSNIPE.COM
Trusted by
COUNTERSNIPE SYSTEMS LLCIntrusion Prevention Systems for Real World Network Security
Version 9.0
CounterSnipe’s version 9.0 is a major
release leveraging stability and
sturdiness of the Ubuntu 14.04(LTS) OS,
high performance and scalability of
Suricata IDS engine together with
incorporation of the Emerging Threats
Ruleset. This new development takes
CounterSnipe to the fore front of Next
Generation IDS/IPS technology to address
ongoing protection required by customers
against Advanced Persistent Threats and
Malware. Release 9.0 provides the latest
research & technology required to combat
the most current cyber security threats.
Copyright © CounterSnipe Systems LLC. Allrights reserved
SURICATA V3
Suricata is a high performance IDS
engine. Suricata’s multi-threaded
architecture can support high
performance multi-core and multi-
processor systems. The major benefits of a
multi-threaded design is that it offers
increased speed and efficiency in
network traffic analysis and can also help
divide up the IDS/IPS workload based on
where the processing needs are. The
engine is builtto utilize the increased
processing power offered by the latest
multi-core CPU chip sets.
Suricata is Open Source and owned by non-
profit foundation,the Open Information
Security Foundation (OISF). CounterSnipe SVP
Amar Rathore is a Board Member of OISF.
Customer Driven Features
We listen to our customers and prospects and
here are 2 examples and our thank you to;
Wepa - for requesting the all new asset
based rule deployment feature. You can now
run CounterSnipe APS in asset detection
mode, click a button and automatically
switch on the rule set most relevant to your
network.
Westerra: for initiating all new MAC based
access control. We went one step further and
have created a facility for you to upload a list
of MAC addresses with control options as
desired, providing you with ability to block
unwanted pcs/laptops from gaining access
via your network.
Just 2 of many new features in Version 9...to make your
IDS/IPS do more for your network security.
IDS/IPS for Real World Security
Key Features Key benefits
 Intrusion Prevention/Detection
 Malware Protection
 Application discovery
 Asset/Change discovery
 Missing/New Asset Alert
 Automatic port scanning
 Threshold based alerting
 Timed scanning
 Application aware IPS rule set
 Event-Asset-Vulnerability correlation
 One click policy creation and
deployment
CounterSnipe is available for Physical or
Virtual servers based both on site or in
cloud such as Amazon Web Server (AWS)
 Control and monitor access with
bespoke rules/policies
 Wider security implementation by
multiple sensor deployment
 Satisfy PCI-DSS, HIPAA, SOX and Data
Protection compliance
 Protect from data loss by monitoring
and controlling file movements
 Round the clock protection from
growing number of Malware
 Cost effective licensing
Systems LLC provides all customers with premium 24*7*365
• Premium 24*7*365 risk data and product updates
to know the product sessions
PRODUCT SUPPORT & SOFTWARE MANAGEMENT
• CounterSnipe
online and email support fromour own SOC (Security Operations Centre)
• Training workshops & onsite/in-house get
• Consultancy/ProfessionalServices for in-depth security implementation
Proof of Concept / Evaluation
How about a live demo?
Register for a CounterSnipe webinar?
Why not download the software and evaluate?
http://countersnipe.com/index.php/try-me-free
Or contact us directly – sales@countersnipe.com
CounterSnipe Systems, experts in strategic security develop Network Security and Intrusion Prevention Systems IDS/IPS software with many additional
features/utilities that make our IDS/IPS software that much more practical. CounterSnipe's agile approach to doing things enables us to create user specific
functions and features in no time. When you experience CounterSnipe in your environment, you also experience the whole team of experts that work with
you towards enhancing total network security.
Copyright © CounterSnipe Systems LLC .All rights reserved

More Related Content

What's hot

Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
Cisco Russia
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
CipherGraph Networks
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
Revital Lapidot
 
Cloud of tomorrow
Cloud of tomorrowCloud of tomorrow
Cloud of tomorrow
Kevin Clarke
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
Robb Boyd
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
AppViewX
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
Qualys
 
Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
AppViewX
 
Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Enterprise Network Design and Deployment
Enterprise Network Design and Deployment
Sandeep Yadav
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
Mike Wallen
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
drewz lin
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
Anusha Vaidyanathan
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
Iftikhar Ali Iqbal
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
VMware
 
Kaspersky
KasperskyKaspersky
Kaspersky
Kappa Data
 
Security Software Datasheet Template
Security Software Datasheet TemplateSecurity Software Datasheet Template
Security Software Datasheet Template
TDSmaker
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
Kaspersky
 

What's hot (20)

Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
Cloud of tomorrow
Cloud of tomorrowCloud of tomorrow
Cloud of tomorrow
 
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
TechWiseTV Workshop: Q&A OpenDNS and AnyConnect
 
Accelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery AutomationAccelerate Digital Transformation with Application Delivery Automation
Accelerate Digital Transformation with Application Delivery Automation
 
Qualys Brochure for CISOs
Qualys Brochure for CISOsQualys Brochure for CISOs
Qualys Brochure for CISOs
 
Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
 
Enterprise Network Design and Deployment
Enterprise Network Design and Deployment Enterprise Network Design and Deployment
Enterprise Network Design and Deployment
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Aureon Managed Firewall
Aureon Managed FirewallAureon Managed Firewall
Aureon Managed Firewall
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
Enterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's PerspectiveEnterprise Network Security & Compliance - A Vendor's Perspective
Enterprise Network Security & Compliance - A Vendor's Perspective
 
Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)Technology Overview - Validation & ID Protection (VIP)
Technology Overview - Validation & ID Protection (VIP)
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
VMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats newVMware vRealize Network Insight 3.4 whats new
VMware vRealize Network Insight 3.4 whats new
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Security Software Datasheet Template
Security Software Datasheet TemplateSecurity Software Datasheet Template
Security Software Datasheet Template
 
Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015Kaspersky Endpoint Security for Business 2015
Kaspersky Endpoint Security for Business 2015
 

Similar to CounterSnipe-v9.0

Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
Qualys
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
AppViewX CERT+ Brochure
AppViewX CERT+ BrochureAppViewX CERT+ Brochure
AppViewX CERT+ Brochure
AppViewX
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
أحلام انصارى
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
seqriteseo
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
Aditi Shrivastava
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
George Wainblat
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Callidus Software
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Benelux
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
GE코리아
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
Lee Dalton
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
illustro
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
WildhaniIhyaraRahman1
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
Norman Mayes
 
Cloud Computing & Sun Vision 03262009
Cloud Computing & Sun Vision 03262009Cloud Computing & Sun Vision 03262009
Cloud Computing & Sun Vision 03262009
guest829442
 

Similar to CounterSnipe-v9.0 (20)

Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
AppViewX CERT+ Brochure
AppViewX CERT+ BrochureAppViewX CERT+ Brochure
AppViewX CERT+ Brochure
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
seqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdfseqrite-mssp-portal-datasheet.pdf
seqrite-mssp-portal-datasheet.pdf
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Encoding Enhancers Woolpack virtualization services
Encoding Enhancers   Woolpack virtualization servicesEncoding Enhancers   Woolpack virtualization services
Encoding Enhancers Woolpack virtualization services
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-ServiceSun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
Sun: Solaris On-Demand Assists ISVs' Strategic Move To Software-As-A-Service
 
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
Sophos Day Belgium - What's cooking in Sophos' Network Security Group?
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
brochure-triton-ap-web-en
brochure-triton-ap-web-enbrochure-triton-ap-web-en
brochure-triton-ap-web-en
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
illustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introductionillustro Overview - z/IPMon Introduction
illustro Overview - z/IPMon Introduction
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Cloud Computing & Sun Vision 03262009
Cloud Computing & Sun Vision 03262009Cloud Computing & Sun Vision 03262009
Cloud Computing & Sun Vision 03262009
 

CounterSnipe-v9.0

  • 2. COUNTERSNIPE SYSTEMS LLCIntrusion Prevention Systems for Real World Network Security Version 9.0 CounterSnipe’s version 9.0 is a major release leveraging stability and sturdiness of the Ubuntu 14.04(LTS) OS, high performance and scalability of Suricata IDS engine together with incorporation of the Emerging Threats Ruleset. This new development takes CounterSnipe to the fore front of Next Generation IDS/IPS technology to address ongoing protection required by customers against Advanced Persistent Threats and Malware. Release 9.0 provides the latest research & technology required to combat the most current cyber security threats. Copyright © CounterSnipe Systems LLC. Allrights reserved SURICATA V3 Suricata is a high performance IDS engine. Suricata’s multi-threaded architecture can support high performance multi-core and multi- processor systems. The major benefits of a multi-threaded design is that it offers increased speed and efficiency in network traffic analysis and can also help divide up the IDS/IPS workload based on where the processing needs are. The engine is builtto utilize the increased processing power offered by the latest multi-core CPU chip sets. Suricata is Open Source and owned by non- profit foundation,the Open Information Security Foundation (OISF). CounterSnipe SVP Amar Rathore is a Board Member of OISF. Customer Driven Features We listen to our customers and prospects and here are 2 examples and our thank you to; Wepa - for requesting the all new asset based rule deployment feature. You can now run CounterSnipe APS in asset detection mode, click a button and automatically switch on the rule set most relevant to your network. Westerra: for initiating all new MAC based access control. We went one step further and have created a facility for you to upload a list of MAC addresses with control options as desired, providing you with ability to block unwanted pcs/laptops from gaining access via your network. Just 2 of many new features in Version 9...to make your IDS/IPS do more for your network security.
  • 3. IDS/IPS for Real World Security Key Features Key benefits  Intrusion Prevention/Detection  Malware Protection  Application discovery  Asset/Change discovery  Missing/New Asset Alert  Automatic port scanning  Threshold based alerting  Timed scanning  Application aware IPS rule set  Event-Asset-Vulnerability correlation  One click policy creation and deployment CounterSnipe is available for Physical or Virtual servers based both on site or in cloud such as Amazon Web Server (AWS)  Control and monitor access with bespoke rules/policies  Wider security implementation by multiple sensor deployment  Satisfy PCI-DSS, HIPAA, SOX and Data Protection compliance  Protect from data loss by monitoring and controlling file movements  Round the clock protection from growing number of Malware  Cost effective licensing
  • 4. Systems LLC provides all customers with premium 24*7*365 • Premium 24*7*365 risk data and product updates to know the product sessions PRODUCT SUPPORT & SOFTWARE MANAGEMENT • CounterSnipe online and email support fromour own SOC (Security Operations Centre) • Training workshops & onsite/in-house get • Consultancy/ProfessionalServices for in-depth security implementation Proof of Concept / Evaluation How about a live demo? Register for a CounterSnipe webinar? Why not download the software and evaluate? http://countersnipe.com/index.php/try-me-free Or contact us directly – sales@countersnipe.com CounterSnipe Systems, experts in strategic security develop Network Security and Intrusion Prevention Systems IDS/IPS software with many additional features/utilities that make our IDS/IPS software that much more practical. CounterSnipe's agile approach to doing things enables us to create user specific functions and features in no time. When you experience CounterSnipe in your environment, you also experience the whole team of experts that work with you towards enhancing total network security. Copyright © CounterSnipe Systems LLC .All rights reserved