Innovative NGIPS

Bricata’s flexible, compound engine provides an optimized rules engine that processes more rules across faster links to better identify known threats, an extensible network behavior engine to identify unknown threats, and powerful threat hunting tools for threats that are hidden.

Current Situation / Landscape


Organizations continue to fight an asymmetric battle against cyber attackers.

Attackers are sophisticated, well-funded, well-organized and use highly-targeted techniques that leave technology-only security strategies exposed. To stop them, organizations need to understand them – how they think, how they work, and what they want.

Traditional IPS VS. Next Gen


Traditional IPS

  • Traditional IPS runs flow analysis upon traffic attempting to match exploit signatures and block the attack.
  • Does not extend beyond signature-based protection.
  • Will not provide real-time protection

Next Gen

  • NGIPS provides broad protection against vulnerabilities and unknown threats
  • Controls the behavior of applications, allowing access but blocking file transfers
  • Provides real-time contextual awareness

The Bricata Difference


If you can’t see it, you can’t protect it. Bricata’s next gen solution provides organizations with deep insight into network devices, applications, users, operating systems, files, and more, for full contextual awareness in real-time. Bricata provides:

  • A high-performance engine optimized for today’s hardware, allowing you to process more rules across faster links
  • Enriched metadata, extending your visibility beyond the simple data associated with the alert to provide a broad view of behavior around targeted systems
  • Sensors compatible with Snort and Suricata Rules as well as Bro Script, ensuring your source of threat intelligence “just works”

Detection


Flexible, compound, optimized engine that detects tomorrow’s threats, as well as today’s.

Visibility


Situational awareness allows identification of how threats operate.

Ecosystem Strength


Extending the value of your existing security ecosystem investments.