SlideShare a Scribd company logo
CounterSnipe – Intelligent Network Security
       What is it?

            Countersnine is Intrusion Prevention (IDS/IPS)
            network security system for protecting IT
            infrastructures from spyware, malware,
            unauthorized access, vulnerability exploit attacks
            and for meeting various regulatory compliance.
                                       Always-ON
                                        detection
                                         of your
       Cloud                            network
                                         assets




© CounterSnipe – 2011
                                                                 TM
CounterSnipe – Intelligent Network Security
        How Does it work?

        Three Steps
          Step 1: Collect information about the
          network to be protected.
        for example:
          2000 pcs/servers
          50 key applications
          Various Vulnerabilities
             Various Open Ports

© CounterSnipe – 2011
                                                    TM
CounterSnipe – Intelligent Network Security
        How Does it work?
        Three Steps
             Step 2: Detect unauthorized or malicious activity,
             policy violations and threats on the network with full
             detail of where the attack originated and its
             destination. Example triggers;
             MP3 file being transferred outbound
             Access to Porn-Sports-Gambling site designed to by
             pass restrictions
             Microsoft Picture Pusher ActiveX Cross Site File
             Upload Attack


© CounterSnipe – 2011
                                                                      TM
CounterSnipe – Intelligent Network Security
        How Does it work?
        Three Steps
             Step 3: Correlate all that’s detected in step 2 with
             the network assets discovered in step 1, and do:
             Log, block and alert upon any violations
             Constantly monitor the network for new hosts and
             alert on discovering new ones.
             Actively scan a newly discovered host and alert
             about its current state, ie open ports and
             applications.
             Continuously keep detecting and updating the
             information about the network and continuously
             adjust the protection accordingly

© CounterSnipe – 2011
                                                                    TM
CounterSnipe – Intelligent Network Security
      How it integrates with your existing infrastructure




 CounterSnipe
 Active Protection
 Appliances (APDs)
 deployed in three
 different positions
 on a network




© CounterSnipe – 2011
                                                            TM
CounterSnipe – Security Management
       Who needs it?
       Every business with multiple users/computers on the
       network. Here are some of the reasons why
       organizations have chosen CounterSnipe:
       • For audit and PCI compliance; PCI-DSS 11.2 requires companies to
       implement IDS/IPS
       • To protect web applications accessed by external users
       • To protect and be accountable for third party access to their
       networks
       • To protect their businesses from network based spyware/malware
       attacks
       • To monitor and enforce various resource access policies
       • To augment other security measures such as anti-virus and firewall


© CounterSnipe – 2011
                                                                              TM
CounterSnipe – Intelligent Network Security
        How to evaluate and buy?

             Contact our international partner in your
             country


             Contact sales@countersnipe.com


                              Thank You



© CounterSnipe – 2011
                                                         TM

More Related Content

PPTX
IDS, IPS, IDPS
PPTX
Intrusion prevention system(ips)
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Intrusion prevention systems
PPTX
Intrusion detection system
PPT
Introduction To Intrusion Detection Systems
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Intrusion Detection System(IDS)
IDS, IPS, IDPS
Intrusion prevention system(ips)
Computer Security and Intrusion Detection(IDS/IPS)
Intrusion prevention systems
Intrusion detection system
Introduction To Intrusion Detection Systems
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection System(IDS)

What's hot (19)

PPT
Intrusion Detection Presentation
PPTX
Intrusion detection
PPTX
PPTX
Intrusion detection systems
PPTX
Intrusion detection system
PPTX
Intrusion Prevention Systems
PPTX
Intrusion detection system
PPT
Intrusion Detection System
PPTX
Intrusion detection system
PPTX
Intrusion detection and prevention system
PPTX
Five Major Types of Intrusion Detection System (IDS)
PPTX
Introduction to Intrusion detection and prevention system for network
DOCX
Intrusion Detection System
PPT
intrusion detection system (IDS)
PDF
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
PPT
AN INTRUSION DETECTION SYSTEM
PPTX
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
PPTX
Network intrusion detection system and analysis
Intrusion Detection Presentation
Intrusion detection
Intrusion detection systems
Intrusion detection system
Intrusion Prevention Systems
Intrusion detection system
Intrusion Detection System
Intrusion detection system
Intrusion detection and prevention system
Five Major Types of Intrusion Detection System (IDS)
Introduction to Intrusion detection and prevention system for network
Intrusion Detection System
intrusion detection system (IDS)
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
AN INTRUSION DETECTION SYSTEM
NGIPS(Next Generation Intrusion Prevention System) in Network security presen...
Network intrusion detection system and analysis
Ad

Viewers also liked (20)

PPTX
Snort IDS/IPS Basics
PPT
IDS and IPS
PPTX
Intrusion Prevention System
PPTX
Ids ips detection
PPTX
Network security
PPTX
PDF
IDS / IPS Survey
PPT
Karthika krishna ethical hacking slides
PPT
Network security
PPTX
Slideshare fintech-may26th-def
PDF
Smart Card Security
PPTX
Kerberos explained
PPT
Smart cards
PPTX
Introduction to IDS & IPS - Part 1
PPTX
Kerberos
PPTX
PPS
Physical security.ppt
PDF
IPS (intrusion prevention system)
PDF
Kerberos Protocol
Snort IDS/IPS Basics
IDS and IPS
Intrusion Prevention System
Ids ips detection
Network security
IDS / IPS Survey
Karthika krishna ethical hacking slides
Network security
Slideshare fintech-may26th-def
Smart Card Security
Kerberos explained
Smart cards
Introduction to IDS & IPS - Part 1
Kerberos
Physical security.ppt
IPS (intrusion prevention system)
Kerberos Protocol
Ad

Similar to IDS/IPS security (20)

PPT
Cs Quick Pres
PPT
CounterSnipe Network Security
PPTX
F5's IP Intelligence Service
PDF
CounterSnipe-v9.0
PDF
Fore scout nac-datasheet
PDF
Why_TG
PDF
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
PPTX
Cyber Attack Survival: Are You Ready?
PPT
Cio ciso security_strategyv1.1
PPTX
ch03.pptx
PDF
Defensive information warfare on open platforms
PDF
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PPTX
UNIT 3 SEC I PART 1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PPTX
Presentation infra and_datacentrre_dialogue_v2
PPTX
Wi fi security dedicated architectures
PPTX
Cyber Security
PDF
004_Cybersecurity Fundamentals Network Security.pdf
PPTX
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
PPT
S nandakumar
Cs Quick Pres
CounterSnipe Network Security
F5's IP Intelligence Service
CounterSnipe-v9.0
Fore scout nac-datasheet
Why_TG
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Cyber Attack Survival: Are You Ready?
Cio ciso security_strategyv1.1
ch03.pptx
Defensive information warfare on open platforms
Cognitive Security - Anatomy of Advanced Persistent Threats ('12)
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
UNIT 3 SEC I PART 1 aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Presentation infra and_datacentrre_dialogue_v2
Wi fi security dedicated architectures
Cyber Security
004_Cybersecurity Fundamentals Network Security.pdf
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
S nandakumar

IDS/IPS security

  • 1. CounterSnipe – Intelligent Network Security What is it? Countersnine is Intrusion Prevention (IDS/IPS) network security system for protecting IT infrastructures from spyware, malware, unauthorized access, vulnerability exploit attacks and for meeting various regulatory compliance. Always-ON detection of your Cloud network assets © CounterSnipe – 2011 TM
  • 2. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 1: Collect information about the network to be protected. for example: 2000 pcs/servers 50 key applications Various Vulnerabilities Various Open Ports © CounterSnipe – 2011 TM
  • 3. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 2: Detect unauthorized or malicious activity, policy violations and threats on the network with full detail of where the attack originated and its destination. Example triggers; MP3 file being transferred outbound Access to Porn-Sports-Gambling site designed to by pass restrictions Microsoft Picture Pusher ActiveX Cross Site File Upload Attack © CounterSnipe – 2011 TM
  • 4. CounterSnipe – Intelligent Network Security How Does it work? Three Steps Step 3: Correlate all that’s detected in step 2 with the network assets discovered in step 1, and do: Log, block and alert upon any violations Constantly monitor the network for new hosts and alert on discovering new ones. Actively scan a newly discovered host and alert about its current state, ie open ports and applications. Continuously keep detecting and updating the information about the network and continuously adjust the protection accordingly © CounterSnipe – 2011 TM
  • 5. CounterSnipe – Intelligent Network Security How it integrates with your existing infrastructure CounterSnipe Active Protection Appliances (APDs) deployed in three different positions on a network © CounterSnipe – 2011 TM
  • 6. CounterSnipe – Security Management Who needs it? Every business with multiple users/computers on the network. Here are some of the reasons why organizations have chosen CounterSnipe: • For audit and PCI compliance; PCI-DSS 11.2 requires companies to implement IDS/IPS • To protect web applications accessed by external users • To protect and be accountable for third party access to their networks • To protect their businesses from network based spyware/malware attacks • To monitor and enforce various resource access policies • To augment other security measures such as anti-virus and firewall © CounterSnipe – 2011 TM
  • 7. CounterSnipe – Intelligent Network Security How to evaluate and buy? Contact our international partner in your country Contact sales@countersnipe.com Thank You © CounterSnipe – 2011 TM