SlideShare a Scribd company logo
CounterSnipe – Intelligent Network Security What is it? Countersnine is Intrusion Prevention (IDS/IPS) network security system for protecting IT infrastructures from spyware, malware, unauthorized access, vulnerability exploit attacks and for meeting various regulatory compliance. Cloud Always-ON detection of your network assets
CounterSnipe – Intelligent Network Security How Does it work?  Three Steps Step 1: Collect information about the network to be protected ie 2000 pcs/servers 50 key applications Various Vulnerabilities  Various Open Ports
CounterSnipe – Intelligent Network Security How Does it work?  Three Steps Step 2: Detect unauthorized or malicious activity, policy violations and threats on the network with full detail of where the attack originated and its destination. Example triggers; MP3 file being transferred outbound  Access to Porn-Sports-Gambling site designed to by pass restrictions  Microsoft Picture Pusher ActiveX Cross Site File Upload Attack
CounterSnipe – Intelligent Network Security How Does it work?  Three Steps Step 3: Correlate all that’s detected in step 2 with the network assets discovered in step 1, and do: Log, block and alert upon any violations Constantly monitor the network for new hosts and alert on discovering new ones. Actively scan a newly discovered host and alert about its current state, ie open ports and applications. Continuously keep detecting and updating the information about the network and continuously adjust the protection accordingly
CounterSnipe – Intelligent Network Security How it   integrates with your existing infrastructure  CounterSnipe Active Protection Appliances (APDs) deployed in three different positions on   a network
CounterSnipe – Security Management Who needs it? Every business with multiple users/computers on the network.  Here are some of the reasons why organizations have chosen CounterSnipe: For audit and PCI compliance; PCI-DSS 11.2 requires companies to implement IDS/IPS To protect web applications accessed by external users To protect and be accountable for third party access to their networks To protect their businesses from network based spyware/malware attacks To monitor and enforce various resource access policies To augment other security measures such as anti-virus and firewall
CounterSnipe – Intelligent Network Security How to evaluate and buy? Contact our international partner in your country Contact  [email_address]   Thank You

More Related Content

PPTX
Network Security
PPTX
Network Security: Attacks, Tools and Techniques
DOCX
Network security
PPTX
Network Security
PPTX
Masters in cyber security
PPTX
Network security
PDF
Network Security Certification
PPT
Network security presentation
Network Security
Network Security: Attacks, Tools and Techniques
Network security
Network Security
Masters in cyber security
Network security
Network Security Certification
Network security presentation

What's hot (20)

PPTX
Modern Network Security Issue and Challenge
PPTX
Network Security & Ethical Hacking
PPTX
Presentation network security
PPTX
Network security
PPTX
edu03firewall,Antivirus software.pptx
PPTX
Introduction to Network Security
PPTX
Ics & computer security for nuclear facilities
PDF
Edu 03Anju 23 assignment.pdf
PDF
Defense in Depth
PPTX
Network security
PDF
mcq edu03 Anju 23.pdf
PPTX
Internet Safety Techniques
PDF
Windows XP End of Support
PDF
Network Security Fundamentals
PPTX
What is network security and Types
PPTX
Network attacks
PDF
Are you the next target?
PPTX
Cyber attack
PPTX
Basics of computer
Modern Network Security Issue and Challenge
Network Security & Ethical Hacking
Presentation network security
Network security
edu03firewall,Antivirus software.pptx
Introduction to Network Security
Ics & computer security for nuclear facilities
Edu 03Anju 23 assignment.pdf
Defense in Depth
Network security
mcq edu03 Anju 23.pdf
Internet Safety Techniques
Windows XP End of Support
Network Security Fundamentals
What is network security and Types
Network attacks
Are you the next target?
Cyber attack
Basics of computer
Ad

Viewers also liked (12)

PPT
Honeypot
PPT
PPT
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
PPT
AN INTRUSION DETECTION SYSTEM
PDF
Snort IPS
PPT
Intrusion Detection Presentation
PPT
CCNA Security 011- implementing ios-based ips
PPT
Introduction To Intrusion Detection Systems
PPTX
Intrusion detection and prevention system
DOCX
Morales-Capstone-IDS.IPS Deployment_revision1
PPTX
Intrusion Detection System(IDS)
Honeypot
IPS Product Comparison of Cisco 4255 & TippingPoint 5000E
AN INTRUSION DETECTION SYSTEM
Snort IPS
Intrusion Detection Presentation
CCNA Security 011- implementing ios-based ips
Introduction To Intrusion Detection Systems
Intrusion detection and prevention system
Morales-Capstone-IDS.IPS Deployment_revision1
Intrusion Detection System(IDS)
Ad

Similar to Cs Quick Pres (20)

PDF
IDS/IPS security
PPTX
Introduction to Cyber-Security beginners.pptx
PDF
Sec0001 .pdf
PPTX
Information Security.pptx
PPTX
IoT Threat Intel - Steppa
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
DOCX
Unit-3 cyber security network security of internet system
PPTX
Cyber security
PDF
Infosec cert service
PDF
Intrusion Detection System Project Report
PPTX
Common Types of Cyber Attacks & How to Prevent Them.pptx
PDF
cybersecurityprt-131017183506-phpapp02.pdf
PDF
cybersecurityprt-131017183506-phpapp02.pdf
PPT
WE16 - Defense in Depth: Top 10 Critical Security Controls
PDF
IRJET- A Review on Intrusion Detection System
PPTX
security onion
DOCX
Proactive Network Monitoring & Cybersecurity Solutions
PPTX
Assessing network security
DOCX
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
DOCX
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...
IDS/IPS security
Introduction to Cyber-Security beginners.pptx
Sec0001 .pdf
Information Security.pptx
IoT Threat Intel - Steppa
Using Your Network as a Sensor for Enhanced Visibility and Security
Unit-3 cyber security network security of internet system
Cyber security
Infosec cert service
Intrusion Detection System Project Report
Common Types of Cyber Attacks & How to Prevent Them.pptx
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
WE16 - Defense in Depth: Top 10 Critical Security Controls
IRJET- A Review on Intrusion Detection System
security onion
Proactive Network Monitoring & Cybersecurity Solutions
Assessing network security
IEEE 2014 DOTNET NETWORKING PROJECTS Network intrusion detection system using...
2014 IEEE DOTNET NETWORKING PROJECT Network intrusion detection system using ...

Cs Quick Pres

  • 1. CounterSnipe – Intelligent Network Security What is it? Countersnine is Intrusion Prevention (IDS/IPS) network security system for protecting IT infrastructures from spyware, malware, unauthorized access, vulnerability exploit attacks and for meeting various regulatory compliance. Cloud Always-ON detection of your network assets
  • 2. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 1: Collect information about the network to be protected ie 2000 pcs/servers 50 key applications Various Vulnerabilities Various Open Ports
  • 3. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 2: Detect unauthorized or malicious activity, policy violations and threats on the network with full detail of where the attack originated and its destination. Example triggers; MP3 file being transferred outbound Access to Porn-Sports-Gambling site designed to by pass restrictions Microsoft Picture Pusher ActiveX Cross Site File Upload Attack
  • 4. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 3: Correlate all that’s detected in step 2 with the network assets discovered in step 1, and do: Log, block and alert upon any violations Constantly monitor the network for new hosts and alert on discovering new ones. Actively scan a newly discovered host and alert about its current state, ie open ports and applications. Continuously keep detecting and updating the information about the network and continuously adjust the protection accordingly
  • 5. CounterSnipe – Intelligent Network Security How it integrates with your existing infrastructure CounterSnipe Active Protection Appliances (APDs) deployed in three different positions on a network
  • 6. CounterSnipe – Security Management Who needs it? Every business with multiple users/computers on the network. Here are some of the reasons why organizations have chosen CounterSnipe: For audit and PCI compliance; PCI-DSS 11.2 requires companies to implement IDS/IPS To protect web applications accessed by external users To protect and be accountable for third party access to their networks To protect their businesses from network based spyware/malware attacks To monitor and enforce various resource access policies To augment other security measures such as anti-virus and firewall
  • 7. CounterSnipe – Intelligent Network Security How to evaluate and buy? Contact our international partner in your country Contact [email_address] Thank You