NSS Group logo

ISS Real Secure Network Gigabit 7.0

Is the product supplied as software only or as a hardware appliance? If supplied as an appliance, please provide the hardware specification (CPU, memory, network cards, etc)
RealSecure Network Gigabit is a software solution.   

What is the maximum speed/network load (Mbps) claimed with zero packet loss?
RealSecure Network Gigabit can monitor up to 1000 mbps with zero packet loss in real-world environments. 

At the maximum load, what is the maximum TCP connection rate (connections per second) claimed?
Maximum connections per second has not yet been determined on this version of RealSecure Network Gigabit (i.e. at XPU 20.13 or higher).  However, field testing has validated that the performance of previous versions of RealSecure Network Gigabit (i.e. XPU 20.12 and below), is more than adequate on fully saturated 1000 mbps real-world segments. 

Product architecture (2-tier/3-tier management? Brief description)
RealSecure�s three-tiered architecture includes Agents, Event Collectors, and Managers for scalable, geographically dispersed deployments on high-speed networks.  The manager includes the Asset Database, Enterprise Database, Event Collector, and Console.  The components can all be installed on the same system or on separate systems in various combinations for performance considerations. 

What are the minimum/recommended sensor OS and hardware requirements? Is a dedicated machine required/recommended?
RealSecure Network Gigabit for Windows:   Dual Pentium III 1.13 GHZ or higher, W2K Pro, Server, or Advanced Server with SP2,  2 GB RAM or higher,  9 GB hard disk space (Ultra ATA or SCSI),  Intel PRO/1000 F adapter for monitoring interface (see www.intel.com/network/products/pro1000giga technical.htm  for more information about this adapter), one standard 10/100 ethernet NIC for regular network access and reporting to Workgroup Manager or SiteProtector, 64-bit/66 mhz PCI version 2.1 bus, COMCTL32.DLL v. 4.72 or higher.  Yes, a dedicated machine is required. 

RealSecure Network Gigabit for Linux:  Dual Pentium III 1.13 GHZ or higher,  Red Hat Linux 7.3 Personal (with 2.4.18-10 SMP Kernel) or Red Hat Linux 7.3 Professional (with 2.4.18-10 SMP Kernel),  SysKonnect SK-9843 SK-NET GE-SX adapter for monitoring interface (see www.syskonnect/products/b 0101 ethernet 9843.html for more information about this adapter), any standard ethernet NIC for network access and reporting to Workgroup Manager or SiteProtector, 64-bit/66-MHz PCI version 2.1 bus, COMCTL32.DLL v4.72 or higher.   Yes, a dedicated machine is required. 

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended?
Yes, a dedicated machine is required.  SiteProtector is the recommended management platform for RealSecure Network Gigabit. The SiteProtector components consist of the Application Server, Enterprise Database, Deployment Manager, Console, and Event Collector.  The Security Fusion module is an optional component that also requires a dedicated machine.  All components can be deployed on a single machine or on separate machines, depending on the number of agents being deployed and managed by one SiteProtector instance.  Hardware recommendations for basic (single unit) and custom (multi-unit) installations can be found at  

http://documents.iss.net/literature/SiteProtector/SiteProtectorSystemRequirements.pdf

What are the minimum/recommended management server OS and hardware requirements (if applicable)? Is a dedicated machine required/recommended?
See above.  

List required open ports on sensor and their use

This component:

Receives data from this component:

On these ports:

And sends data to this component:

On these ports:

Application Server

Console

3998

3999

Sensors/Agent

JDBC

SiteProtector Console

2998

12

3994

Deployment Manager

Sensor Controller

HTTP

2998

 

80

SQL Server

1433, 1434, 135*, 445*

Event Collector

Sensor Controller

Events from Sensors/Agents

2998

 

90x

SQL Server

 

Security Fusion Module

1433, 1434, 135*, 445*

9xx

Security Fusion Module

Events from Event Collectors

Sensor Controller

9xx

 

2998

Events

SQL Server

 

JDBC

9xx

1433, 1434, 135*, 445*

12

SiteProtector Console

 

 

Application Server

Sensor Controller

3998, 3999

3996, 3997

Sensor Controller

Console

3996, 3997

All Sensors/Agents & Event Collectors

JDBC

SiteProtector Console

2998

 

12

3995

Site Database

Miscellaneous Components

1433, 1434, 135*, 445*

 

 

 

RealSecure Sensors & Proventia Appliances

Sensor Controller

Event Collector

2998

 

90x

SNMP Trap Listener

SMTP Server

162

 

25

IDS Server

Miscellaneous Components

12

 

 

*Depending on the SQL configuration. 

List required open ports on management server (if applicable) and their use
See above. 

List required open ports on GUI/management console and their use
See above. 

Communication protocol between sensor and management server
Microsoft or Certicom encryption is used between components.  See below. 

Communication protocol between management server and GUI/console
SSL is used between SiteProtector components and the SiteProtector console.   

Encryption between sensor and management server
All data between Agents and Event Collectors and between Event Collectors and Managers is strongly authenticated and strongly encrypted using public key asymmetric cryptography.  RealSecure ships with Certicom�s elliptic curve encryption module which generates 239-bit private/public keys.  This is true for both Unix and Windows sensors.  Additionally, Windows sensors also use encryption algorithms supported by Microsoft�s cryptographic API.  Microsoft�s default CSP uses RSA technology and provides 40-bit, 128-bit, or 168-bit 3DES symmetric encryption keys and 512-bit or 1024-bit public encryption keys. 1536-bit high strength RSA encryption is also supported.  

Encryption between management server and GUI/console
See above. 

Once deployed and configured, can sensors be managed from a central console?
Yes,  RealSecure Network Gigabit can be configured and updated from the central SiteProtector console. 

Capacity of the system? How many endpoints can be monitored? Ratio of endpoints to management servers/consoles, etc.
A single SiteProtector console has been known to monitor several hundred agents (a mixture of RealSecure Network, RealSecure Network Gigabit, Proventia, RealSecure Server, RealSecure Desktop, and Internet Scanner agents).  The actual limits of SiteProtector are unknown, as it has not yet been scaled to its maximum potential in the field. However, a relatively small, two server configuration (each with 800 MHz PIII) has been noted in customer environments to manage over 15,000 heterogeneous agents, many of which were desktop and server agents, collecting over 22 million events per day.  From this information, it is presumed that more powerful servers can manage more agents depending on the event load, number of events being generated by each agent, and the number and type of agents being managed (network, server, or desktop). 

What anti-flooding methods are employed (sensor to management server, and management server to console)?
The RealSecure sensor/agent coelesces similar events, drastically cutting down on storage during floods. Each sensor's queue can be configured to wrap-around and overwrite older events, if flooding persists for a long period of time.  

Maximum insertion rate into alerts database
There is no definitive maximum as this number is based on the hardware used and database configuration.  In the field, the database has been noted to store 250 events per second.   

Maximum size of database
This is dependent on the hardware.  The backend database is SQL Server 2000, which can support terabyte-sized databases. Using the SiteProtector Enterprise Dashboard to manage multiple SiteProtector sites, multiple databases are supported.  

Maximum number of alerts stored
This is dependent on the hardware.  The maximum number of events is dependant on the size of the disk space allocated to SQL Server.  As a guide, one gb of disk space can hold approximately 750,000 events.   

What happens to alerts in main alert database once capacity limits exceeded (deleted/archived/etc)
There is a data purging mechanism which can be scheduled to occur periodically.  This not only provides the ability to delete records if capacity has been reached, but it also provides the ability to keep the database at a manageable level. 

What is maximum recommended size of alerts database to maintain acceptable query performance?
The maximum size is dependent upon the hardware used to maintain the database.  Analysis is designed to be able to view millions of events at a high level and query a focused set of data easily.  This architecture allows for maximizing the size of the alert database without adversely affecting the analysis query performance.   

When alerts are removed from main alert database, are they still available for reporting directly (i.e. can reporting tools merge current and archived alerts)
Yes, events that are cleared from the SiteProtector console can still be accessed for reporting purposes. The reports created through SiteProtector require the events to be present in the database when the reports are generated. The data stored in the database has rollup levels. Long term rollups take up little space, so long term trending is very easy. Medium term analysis is possible without complete access to all of the event details for a longer period of time. Since detail data takes up the most space, it should be retained for the shortest period of time. Bearing this in mind, archived data can be restored for inclusion in detailed reports. 

Which database product is used for alert storage? Is schema open?
SQL Server 2000 is used.  Yes, the schema is available to customers. 

What happens when communications between sensor and management server/console are interrupted? Local logging on sensor? Maximum capacity? What happens when local sensor logs are full? Is the local repository secure?
If connectivity between the sensor and the event collector is disrupted, the event data is stored locally on the sensor until connection is re-established.  If connectivity between the event collector and the console is disrupted, the events are stored locally on the event collector until the connectivity is restored to the console at which time the events will appear on the console as determined by the security policy in effect.  The console does not need to be operational in order for the events to be stored.  When connectivity to any RealSecure component is lost (other than the console itself), a sensor warning alert is sent to the console.  In short, the system fully recovers from these outages automatically.  The only way to lose data is for the connection to go down for so long that the sensor storage limits are exceeded (configurable up to disk limits).   

Secure logon for policy management?
Yes, Windows authentication is used to limit access to the RealSecure components.   

Granular access (i.e. read only/read-write/etc) granted on a per-user basis? What levels of granularity are supported?
SiteProtector has granular user control in that  multiple roles can be created under different user accounts to prohibit certain administrative functions.  For example, one user account may only be able to view events while another is able to view events and modify policy while yet another is able to do both plus start, stop, and deploy sensors.   

Is it possible to define multiple policies for the sole purpose of distributing to multiple sensors with different functions?
Yes, users may create custom policies and push them out to various sensors.  For example, a DMZ policy can be created and pushed out to the DMZ segments while an External Net policy can be created and pushed out to segments beyond the DMZs and/or segments not firewalled at all to cover all points of entry into the network from the internet. 

How are policies distributed to sensors?
Policies are distributed to sensors from the SiteProtector central console.   

Can policies be deployed on a per-sensor or per-group basis, or globally only?
Yes.  Policies can be deployed in all three of these ways. 

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
RealSecure policies are highly configurable. Individual signatures can be enabled and responses set optimally for a customer�s environment.  Policy is centrally managed and is controlled by user roles. Users can only change policy if they are authorized to do so. The sensors send notification when a new policy is applied.  If a policy is inadvertently applied to a sensor or group of sensors by an authorized user, that active policy is displayed at the console, and the original policy can be easily redeployed to that sensor or group of sensors. The Console will notify the administrator which Sensors are using the changed Policy and provide the option to deploy to all Sensors in a single operation. 

Can policy deployment be scheduled?
Yes, policy deployments can be scheduled through SiteProtector. 

Does the sensor remain able to detect alerts at all times during policy/signature updates? Explain how this is achieved. The sensor goes offline briefly, but this can be scheduled to occur at a low risk time of day.  For policy updates, it takes less than five seconds and for signature updates, it takes less than 20 seconds.   

Can the administrator define custom attack signatures?
Yes, custom signatures can be created using the TRONS module which accepts open-source (Snort) syntax rules  These rules are created using the console GUI and a validation tool verifies the syntax before the rule is applied to a policy.  

Regex supported when creating custom signatures?
Yes, regular expressions are supported. 

How are new vendor attack signatures obtained and deployed?
New signatures are added using the X-Press Update (XPU) technology built into each ISS product by selecting the appropriate X-Press Update option from the SiteProtector console.  RealSecure then accesses the ISS web site, downloads any new updates, and applies them to the sensor policies as specified.  The updated policies are then pushed out to the sensors all at once, by groups, or by individual sensor.  Updates can also be downloaded to another system and manually copied to the SiteProtector console machine should the console not have internet access. 

Frequency of signature updates?
Because of the protocol analysis module built-in to the sensor, a signature update is not necessarily required for every new threat that is discovered.  Many previously unknown threats that RealSecure detected before they were given a specific name include:  .printer overflow, rpc.statd format-string attack, DNS TSIG overflow, Telnet buffer overflow, UTF8 (used by Nimda), .ida overflow (used by Code Red), BSD-based telnet overflow, SysV telnet overflow, several SNMP vulnerabilities, Jolt and Jolt2, SQL Slammer, and many others.   Beyond the standard HTTP, SMTP, FTP, Telnet, SNMP, ICMP, etc. protocol analysis intelligently monitors TFTP, IMAP4, POP3, MIME, DHCP, SOCKS, bootparam, rusers,ypupdate, finger, NetMeeting, Rsh, cmsd, Gopher, ssh, rlogin, ICQ, statd, nfs, portmapper, and unknown buffer overflow attacks.   X-Press Updates are still developed on a monthly basis, either to add more decodes or as service releases based on customer feedback through our technical support channel.  Emergency updates are also developed for those new threats not already covered. 

What infrastructure does the vendor have behind the signature update process (i.e. dedicated team of engineers? How many? Does it have a name?)
X-Force, a team of approximately 150 security engineers, is responsible for the security content and update process and prioritization across all ISS products and services.   

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each sensor/management server?
Yes, a live internet connection is not necessary as there is also a manual process available.  One update can be applied to all sensors simultaneously.   

Can signature updates be scheduled and fully automated?
Yes, signature updates can be initiated by the user or can be scheduled using SiteProtector.   

Which network types are supported by the sensor?
RealSecure Network Gigabit supports gigabit ethernet networks. 

What network protocols are analysed?
RealSecure Network Gigabit fully analyzes and decodes the following network and application protocols:  802.1q, 802.2, 802.3, 802.3u, 802.3z, 802.5, aolim, arp, automount, backorifice, bgp, bo2k, bootp, bootparam, cmsd, dhcp, dns, email, fddi, finger, fsp, ftp, gnutella, h245, http, icecap, icmp, ident, igmp, imap4, ip, ipv6, irc, java, lanman, ldap, lpr, mime, mms, mountd, mpls, ms_messenger, msrpc, napster, netbios, nfs, nis, nntp, pcanywhere, pcnfsd, pop3, portmapper, pppoe, pptp, q931, quake, radius, rexec, rfb, rip, rlogin, rsh, rtsp, selnsvc, sgifam, smb, smtp, snmp, snmpxdmid, sntp, socks, sql_server, ssh, ssl, statd, subseven, sunadmind, sunrpc, syslog, talk, tcp, telnet, tftp, tooltalk, udp, url, virus, xdmcp, xfs, xml, yahoo_messenger, ypbind, yppasswdd, and ypupdated. 

What application-level protocols are analysed?
See above. 

Can the product perform protocol decodes?
Yes, ISS uses a common Protection Engine across its network, server, and desktop agents to detect, prevent, and respond to known and unknown threats.  One component of this engine is the protocol analysis module which performs 7-layer, state-based protocol decoding, validation, and anomaly detection.  Using packet captures, the entire decode is made available to the user.  Also, it can create many decode files and save them separately based upon the configured response to certain events.  This protocol decoding is especially effective for detecting previously unknown threats since it focuses on the underlying vulnerability rather than a specific exploit of the vulnerability.  An example of this is the detection of the underlying vulnerability that was exploited by SQL Slammer.  Without requiring a signature update, RealSecure detected this as SQL_SSRP_StackBo which indicated that the underlying stack buffer overflow vulnerability of SQL Server was being exploited.  Less than a few hours later, this exploit was named �SQL Slammer� and RealSecure was then updated to include a decode name for that specific exploit.  Should another new attack attempt to exploit the same SQL vulnerability, the SQL_SSRP_StackBo event would once again be triggered and the attack stopped depending on the pre-defined configured response.  This illustrates the advantage of protocol decoding over pure pattern-match signatures which are written for specific exploits rather than the underlying vulnerability.     

Can the product perform protocol anomaly detection?
Yes, the protocol analysis module within the Protection Engine does protocol anomaly detection by performing protocol validation and RFC compliance checking.  However, since some protocol anomalies do not necessarily constitute an attack, RealSecure is able to distinguish between a non-compliance and an actual intrusion attempt or malicious activity.  Since many protocol anomalies are benign, RealSecure focuses its anomaly detection on those areas that are most likely to indicate an attack so as to avoid false alarms yet trigger on previously unknown threats. 

Is the detection engine �stateful�? If so, please explain how this works.
Yes, the Protection Engine performs state-based packet inspection, protocol analysis, protocol anomaly detection, pattern-matching, decoding of backdoor communications/protocols, multi-format Unicode URL decoding, port-independent protocol detection and decoding, attack verification using target host responses, TCP reassembly, and IP defragmentation.  Stateful packet inspection technology means that the sensor doesn�t just match patterns to a single packet but rather stores the data stream in a state table on a packet-to-packet basis.  For example, it can determine the success or failure of HTTP attacks using stateful inspection.  

If stateful - how many open connections can be tracked? Is this value configurable?
The default limit is 500,000 connections.  This is configurable to over a million which would likely require more memory in the sensor than the minimum system requirements (4gb is recommended).  Using the Security Fusion module with SiteProtector, the views can be configured to display only attacks made against a vulnerable target while suppressing those made against non-vulnerable targets.  Yes, this behavior is completely configurable and can be modified to alert on all attacks if desired, regardless of the vulnerability state of the target. 

If stateful - for how long are partially opened connections tracked? Is this configurable?
These are not tracked or counted separately, but there are safeguards, such as the coelescer and noise threshold parameters, to prevent resource exhaustion from syn attacks or other flood-type denial of service attempts or network anomalies. 

If stateful - for how long are fully opened connections tracked if not used? Is this configurable?
The default timeout is 5 minutes assuming the connection is not closed gracefully.  This is configurable. 

If stateful � explain the behaviour of the system when the state tables are filled
In the general case, new connections are dropped.  In the case of IP defragmentation and TCP reassembly, an event is reported and the reassembly pool is flushed. 

Will the detection engine alert on ALL suspicious activity, or only when an attack is made against a vulnerable server? If so, please explain in detail how this works. Can this behaviour be modified (i.e. to alert on ALL attacks if required)?
Using the optional Security Fusion module with SiteProtector, the views can be configured to display only attacks made against a vulnerable target while suppressing those made against non-vulnerable targets.  Yes, this behavior is completely configurable and can be modified to alert on all attacks if desired, regardless of the state of the target.  There are also parameters in that can be set for each signature to adjust noise thresholds so that an event is displayed only once to the console under certain conditions in order to minimize the number of events the user has to process.  These advanced tuning parameters have several adjustable fields to filter or display events to and/or from a specific host or IP address/range.                                                

Are server responses monitored and alerted upon?
Yes.  This is referred to as �attack verification.�  

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes. 

Detect network-level packet based attacks?
Yes. 

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes. 

Detect SYN floods? Manual or automatic thresholds? Configurable?
Yes. 

Perform packet/stream reassembly?
Yes. 

Perform deobfuscation?
Yes, evasion techniques that obfuscate malicious traffic are not successful against RealSecure.  This is configurable.  In some cases, an evasion technique is taken so far that the receiving host can no longer piece it together as an attack.  This is something that is tunable in RealSecure.  Examples are favoring new or old TCP data in an overlap connection.  Or, RealSecure can deal with the overlap, small frames, and time delay, but if there are too many small, overlapped frames with too much time in between, the receiving host will drop it since it no longer constitutes an attack.   

List all �prevention� features available (TCP reset, ICMP unreachable, firewall reconfiguration, drop packets (in-line only))
RealSecure can terminate sessions via a TCP RST sent to both hosts in the conversation.  It can also dynamically reconfigure a Check Point FW-1 via the OPSEC response.  This will add a rule to the firewall policy for a configurable about of time to terminate the existing session and drop packets from the attacking source for a pre-defined period of time or for an indefinite period of time.  RealSecure can also communicate with other infrastructure devices via a user-defined response.  An example is that it can modify the ACL on a router using EXPECT scripts to block connections based on protocol, service, and/or IP address/range.  

Packet capture capabilities? Only the trigger packet, or before and after? How are packet captures stored/viewed?
RealSecure has two options for capturing packets:  Evidence Logging and Packet Logging.  The Evidence Logging response stores the exact packet that triggered the event in a file by itself at the sensor.   

Option to record entire sessions for �forensic� investigation? Where is this data stored? How is it secured from tampering?
Packet Logging stores all packets surrounding an event in a circular queue of files stored at the sensor.  Storage limits are configurable.  It�s secured by standard OS authentication to that system.   

Reporting from sensor to console - range of alert response options (detail these, i.e. log, alert, e-mail, pager, packet capture, etc)
There are several actions that can be configured in the security policy on a per event basis.  Responses to events include: RSKill (TCP RST response), sending an alert to the console or to multiple consoles, sending an SNMP trap to a 3rd party trap handler, reconfiguring a Check Point FW-1 rule base, logging a summary of the event in the database (with or without raw), email notification to one or more mail addresses or distribution lists, and executing a user-defined program.

Can alert response options be set only at a global policy level, only at individual signature level, or to groups of signatures (or a mixture of all three)?
Responses are configurable on a per event basis.  They can also be globally applied to many sensors at once, but not to just a group of signatures at once.  

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes, alerts are sent to the SiteProtector console in real-time without any third-party software.  It is easy to filter and extract individual events and drilldown to specific incidents using on attack pattern recognition and impact analysis features.     

Can alerts from all sensors be viewed at a single console at the same time (i.e. without having to connect to separate sensors from the console)?
Yes, all events are transmitted to SiteProtector in real-time from the Event Collectors of all managed sensors after logic, analysis, and correlation are applied.  These events are all stored in the Enterprise Database for historic and real-time viewing. 

Can the central console correlate alerts from multiple sensors (i.e. not just display alerts from multiple sensors, but attempt to infer a connection between different alerts on different sensors)?
Yes, SiteProtector with the Security Fusion module offers attack pattern recognition which correlates events from multiple sensors to discover relationships between events and determine whether a coordinated attack is occurring. 

Can alerts be correlated manually by the administrator - grouped together in the database as a single event for further investigation?
Yes, events can be correlated manually or using the built-in logic that is available with the Security Fusion module.  There is also native drilldown capability from within SiteProtector.  Events can be correlated on many fields, such as source IP, destination IP, type event type, time, date, etc.  Many events can be filtered down to just a few actionable incidents automatically so that the administrator is able to quickly respond to high priority incidents rather than trying to sift through thousands of events.

Can alerts/events be annotated and tracked for investigation by multiple administrators/investigators?
Yes, using the incidents functionality users can track events and add notations describing any actions taken to resolve the incident.   Viewing events is done through a console whose access is managed through group membership which also provides for role- based permissions within the management/analysis console. 

Does the software offer advice on preventative action to ensure the attack does not happen again?
Yes, all events are thoroughly detailed by X-Force and searchable in the online help along with what OSes are effected, the severity of the event, any known false positive or false alarm conditions, the corrective action recommended, and links to CERT advisories, CVE-correlations,  OS vendors, and other related information.   

What industry standards are supported - Intrusion Detection Exchange Format working group (IDWG), Intrusion Alert Protocol (IAP), Intrusion Detection Message Exchange Format (IDMEF), IDXP - and in what way?
ISS X-Force are founding members of the IDMEF working group.  However, this standard has not yet been adopted by the industry.   

Which third party event correlation systems are supported and in what way?
There are several third party vendors that receive events from RealSecure Network such as netForensics, Symantec ManHunt, Arcsight, Guardednet NeuSecure, as well as many others.   

Integration with other scanning/IDS products?
Yes, RealSecure is able to import open-source (Snort) signatures via the TRONS utility.  It is also integrated with Internet Scanner via the Security Fusion module to reveal whether an attack was successful based on the vulnerability state of the target. This required an in-depth analysis and mapping of the implementation of an Internet Scanner vulnerability check and it�s relationship to the directionality, port, etc. of the IDS signature.  Currently, the Security Fusion module is able to correlate nearly 800 RealSecure events with Internet Scanner vulnerability checks.  Other types of correlations include events from RealSecure Server and System Scanner agents.  RealSecure Network and Gigabit Network are also integrated with RealSecure Desktop via the SiteProtector management platform.   

Log file maintenance � automatic rotation, archiving, reporting from archived logs, etc.
Data archival is possible through the use of SQL server backup and restore options, however there is not a a built-in mechanism within SiteProtector for archiving and recovering data. 

Management reporting � range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Yes, this is quite simple as all data is transmitted from the Event Collector to the SQL or MSDE Database.  Granular, specialized reports can be easily created directly from the database, a free utility called FastReports, and /or Crystal Reports.  SiteProtector data views can be exported to CSV files for specialized reports creation.  There are also several built-in reports that can be exported to other formats as of version 2.0. 

Are trend/comparison reports available?
Yes, trend analysis and comparison reports are built-in. 

Does reporting allow customised filtering down to the level of reporting all activity on a specific network resource/object by a specific user/machine on a specific date?
Yes, all views are fully customizable as are several types of reports.  Extensive drilldown capability quickly reveals attack patterns, coordinated attacks, vulnerable targets, etc.   

Report management � can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
SiteProtector provides the ability to schedule reports to be pushed to a web site.  Additional scripting would be required to automatically email the reports. 

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
Yes, events from multiple sensors can be filtered, aggregated, consolidated, and correlated into various real-time and historic views which can then be exported to CSV files.  SiteProtector also offers event and vulnerability information from network and host vulnerability assessment and desktop firewall/intrusion detection components. 

Ability to define custom reports?
Yes, reports can be created and/or customized by the user.  This is in addition to the default reports that ship with the product.   Console views can be stored as formatted reports and generated immediately  or on a scheduled basis.   

Provide brief description of any management software included in the base price of the product. 
SiteProtector is a centralized management platform that integrates network, server, and desktop protection agents for dynamic detection, prevention, and response to known and unknown threats across a geographically dispersed, heterogeneous digital  environment.    

Provide brief description of any additional management products available as extra cost options. 
SiteProtector works with the Security Fusion module, which is an add-on option but not a requirement.  It enables IDS/VA/OS correlation into a single, asset-oriented context thus minimizing the number of events displayed to the user.  It  checks incoming IDS events against vulnerabilities and operating systems discovered to immediately estimate the impact (success or failure) of attacks.  It can automatically escalate these important events, by increasing event priority and/or by responding with additional actions (such as email or paging).   

Security Fusion 2.0 provides attack pattern analysis on nearly 800 security checks.  It ships with attack pattern signatures that will automatically escalate critical patterns of attacks to create actionable incidents. 

Documentation provided
RealSecure Network Gigabit includes the following documentation, either hardcopy, online, or both:  RealSecure Network & Gigabit Network Installation Guide, Policy Guide, Migration Guide, FAQ, Product Spec Sheet, and System Requirements.  Additionally, SiteProtector includes the following documentation, either hardcopy, online, or both:  Installation and Configuration Guide, Reference Guide, Strategy Guide, Troubleshooting Guide, Upgrading to SiteProtector 2.0 Guide, and Product Spec Sheet.  If the Security Fusion module is purchased, additional documentation includes:  Security Fusion Module FAQ, Datasheet, Reference Guide, and System Requirements. 

How is the product licensed? How is the license enforced?
Each license key contains fields for the components purchased and is not restricted in any way by  IP address, network, or host name.  Instead, the key restricts functionality based on the number and type of sensors, number and type of managers, and number of assets correlated by the Security Fusion module.  The license key resides on the SiteProtector console. 

End user pricing information
RealSecure Network Gigabit is priced at $26,996.  It�s maintenance is priced at 20% which equates to $4999.20.  The Security Fusion module is priced at  $145 per managed asset.  Future versions of RealSecure software and Proventia appliances split maintenance into technical support/service and security content price points. 

Ongoing cost of maintenance/updates
RealSecure Network Gigabit maintenance should be renewed on an annual basis but this is not mandatory.  Currently, maintenance includes product updates, service releases, security content updates, 24x7x365 technical support (both email and phone support), and access to the Technical Support Customer Knowledge Base for self-serve problem resolution.  Platinum Technical Support can be purchased at an additional cost.  Security Content for Proventia appliances and other future ISS products will be a separate cost, thus reducing the cost of pure support. 

Click here to return to the ISS Real Secure Review
Click here to return to the IDS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.