Bricata is a network cybersecurity solution supplier helping organizations harness the power of complete network visibility to detect, hunt, and prevent threats with the only commercialized open source and partner developed malware conviction engine.
Conventional IDS/IPS systems have lacked the innovation needed to address advanced threats, evidenced by the wide-scale adoption of Open Source solutions. Bro and Suricata are two of the leading engines many teams are using to create tools; but like most open source technologies, they can be difficult to build, deploy, and maintain in-house without the right expertise.
Bricata is closing the gap by delivering the first network security sensors with integrated Bro and Suricata engines. We simplify operations and maintenance with a middleware layer and central management console that makes signature, script, and policy management much easier, and delivers enterprise scalability with enhanced usability and performance.
Suricata is a free and open source, mature, fast, and robust network threat detection engine capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM), and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.
The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.
More Rules, Faster Connections
Multiple Threat Intelligence Sources
Powerful Control, Greater Flexibility
June 19, 2018
This review serves as more than a demonstration of product capabilities – it also provides an outline for how a security operations center (SOC) can begin hunting threats with a tool the staff already know and use....Read More
Healthcare struggles to get complete visibility into the IT infrastructure because it’s often an eclectic mix of technologies amassed both from organic purchased and company acquisition. The additional constraints of budget limits, and the move to the cloud, require healthcare security pros to be both strategic and tactical in their decision making....Read More
The cloud is changing the way enterprises need to think about security because they don’t have the same visibility. Enterprises can go all cloud, all on-premise, or use a cloud hybrid approach and each comes with unique security challenges....Read More