![]() |
ISS Real Secure Network Gigabit 7.0
Is the product supplied as software only or as a hardware
appliance? If supplied as an appliance, please provide the hardware
specification (CPU, memory, network cards, etc)
RealSecure Network Gigabit is a software solution.
What
is the maximum speed/network load (Mbps) claimed with zero packet loss?
RealSecure Network Gigabit can monitor up to 1000 mbps with zero
packet loss in real-world environments.
At
the maximum load, what is the maximum TCP connection rate (connections per
second) claimed?
Maximum connections per second has not yet been determined on
this version of RealSecure Network Gigabit (i.e. at XPU 20.13 or higher).
However, field testing has validated that the performance of previous versions
of RealSecure Network Gigabit (i.e. XPU 20.12 and below), is more than adequate
on fully saturated 1000 mbps real-world segments.
Product architecture (2-tier/3-tier management? Brief
description)
RealSecure�s three-tiered architecture includes Agents, Event
Collectors, and Managers for scalable, geographically dispersed deployments on
high-speed networks. The manager includes the Asset Database, Enterprise
Database, Event Collector, and Console. The components can all be installed on
the same system or on separate systems in various combinations for performance
considerations.
What are the minimum/recommended sensor OS and hardware
requirements? Is a dedicated machine required/recommended?
RealSecure Network Gigabit for Windows: Dual Pentium III 1.13
GHZ or higher, W2K Pro, Server, or Advanced Server with SP2, 2 GB RAM or
higher, 9 GB hard disk space (Ultra ATA or SCSI), Intel PRO/1000 F adapter for
monitoring interface (see www.intel.com/network/products/pro1000giga
technical.htm for
more information about this adapter), one standard 10/100 ethernet NIC for
regular network access and reporting to Workgroup Manager or SiteProtector,
64-bit/66 mhz PCI version 2.1 bus, COMCTL32.DLL v. 4.72 or higher. Yes, a
dedicated machine is required.
RealSecure Network Gigabit for Linux: Dual Pentium III 1.13 GHZ or higher, Red Hat Linux 7.3 Personal (with 2.4.18-10 SMP Kernel) or Red Hat Linux 7.3 Professional (with 2.4.18-10 SMP Kernel), SysKonnect SK-9843 SK-NET GE-SX adapter for monitoring interface (see www.syskonnect/products/b 0101 ethernet 9843.html for more information about this adapter), any standard ethernet NIC for network access and reporting to Workgroup Manager or SiteProtector, 64-bit/66-MHz PCI version 2.1 bus, COMCTL32.DLL v4.72 or higher. Yes, a dedicated machine is required.
What are the minimum/recommended console OS and hardware
requirements? Is a dedicated machine required/recommended?
Yes, a dedicated machine is required. SiteProtector is the
recommended management platform for RealSecure Network Gigabit. The
SiteProtector components consist of the Application Server, Enterprise Database,
Deployment Manager, Console, and Event Collector. The Security Fusion module is
an optional component that also requires a dedicated machine. All components
can be deployed on a single machine or on separate machines, depending on the
number of agents being deployed and managed by one SiteProtector instance.
Hardware recommendations for basic (single unit) and custom (multi-unit)
installations can be found at
http://documents.iss.net/literature/SiteProtector/SiteProtectorSystemRequirements.pdf
What are the minimum/recommended management server OS and
hardware requirements (if applicable)? Is a dedicated machine
required/recommended?
See above.
List required open ports on sensor and their use
This component: |
Receives data from this component: |
On these ports: |
And sends data to this component: |
On these ports: |
Application Server |
Console |
3998 3999 |
Sensors/Agent JDBC SiteProtector Console |
2998 12 3994 |
Deployment Manager |
Sensor Controller HTTP |
2998
80 |
SQL Server |
1433, 1434, 135*, 445* |
Event Collector |
Sensor Controller Events from Sensors/Agents |
2998
90x |
SQL Server
Security Fusion Module |
1433, 1434, 135*, 445* 9xx |
Security Fusion Module |
Events from Event Collectors Sensor Controller |
9xx
2998 |
Events SQL Server
JDBC |
9xx 1433, 1434, 135*, 445* 12 |
SiteProtector Console |
|
|
Application Server Sensor Controller |
3998, 3999 3996, 3997 |
Sensor Controller |
Console |
3996, 3997 |
All Sensors/Agents & Event Collectors JDBC SiteProtector Console |
2998
12 3995 |
Site Database |
Miscellaneous Components |
1433, 1434, 135*, 445*
|
|
|
RealSecure Sensors & Proventia Appliances |
Sensor Controller Event Collector |
2998
90x |
SNMP Trap Listener SMTP Server |
162
25 |
IDS Server |
Miscellaneous Components |
12 |
|
|
*Depending on the SQL configuration.
List required open ports on management server (if applicable) and
their use
See above.
List required open ports on GUI/management console and their use
See above.
Communication protocol between sensor and management server
Microsoft or Certicom encryption is used between components. See
below.
Communication protocol between management server and GUI/console
SSL is used between SiteProtector components and the
SiteProtector console.
Encryption between sensor and management server
All data between Agents and Event Collectors and between Event
Collectors and Managers is strongly authenticated and strongly encrypted using
public key asymmetric cryptography. RealSecure ships with Certicom�s elliptic
curve encryption module which generates 239-bit private/public keys. This is
true for both Unix and Windows sensors. Additionally, Windows sensors also use
encryption algorithms supported by Microsoft�s cryptographic API. Microsoft�s
default CSP uses RSA technology and provides 40-bit, 128-bit, or 168-bit 3DES
symmetric encryption keys and 512-bit or 1024-bit public encryption keys.
1536-bit high strength RSA encryption is also supported.
Encryption between management server and GUI/console
See above.
Once deployed and configured, can sensors be managed from a
central console?
Yes, RealSecure Network Gigabit can be configured and updated from the central
SiteProtector console.
Capacity of the system? How many endpoints can be monitored?
Ratio of endpoints to management servers/consoles, etc.
A single SiteProtector console has been known to monitor several
hundred agents (a mixture of RealSecure Network, RealSecure Network Gigabit,
Proventia, RealSecure Server, RealSecure Desktop, and Internet Scanner agents).
The actual limits of SiteProtector are unknown, as it has not yet been scaled to
its maximum potential in the field. However, a relatively small, two server
configuration (each with 800 MHz PIII) has been noted in customer environments
to manage over 15,000 heterogeneous agents, many of which were desktop and
server agents, collecting over 22 million events per day. From this
information, it is presumed that more powerful servers can manage more agents
depending on the event load, number of events being generated by each agent, and
the number and type of agents being managed (network, server, or desktop).
What
anti-flooding methods are employed (sensor to management server, and management
server to console)?
The RealSecure sensor/agent coelesces similar events, drastically
cutting down on storage during floods. Each sensor's queue can be configured to
wrap-around and overwrite older events, if flooding persists for a long period
of time.
Maximum insertion rate into alerts database
There is no definitive maximum as this number is based on the
hardware used and database configuration. In the field, the database has been
noted to store 250 events per second.
Maximum size of database
This is dependent on the hardware. The backend database is SQL
Server 2000, which can support terabyte-sized databases. Using the SiteProtector
Enterprise Dashboard to manage multiple SiteProtector sites, multiple databases
are supported.
Maximum number of alerts stored
This is dependent on the hardware. The maximum number of events
is dependant on the size of the disk space allocated to SQL Server. As a guide,
one gb of disk space can hold approximately 750,000 events.
What happens to alerts in main alert database once capacity
limits exceeded (deleted/archived/etc)
There is a data purging mechanism which can be scheduled to occur
periodically. This not only provides the ability to delete records if capacity
has been reached, but it also provides the ability to keep the database at a
manageable level.
What is maximum recommended size of alerts database to maintain
acceptable query performance?
The maximum size is dependent upon the hardware used to maintain
the database. Analysis is designed to be able to view millions of events at a
high level and query a focused set of data easily. This architecture allows for
maximizing the size of the alert database without adversely affecting the
analysis query performance.
When alerts are removed from main alert database, are they still
available for reporting directly (i.e. can reporting tools merge current and
archived alerts)
Yes, events that are cleared from the SiteProtector console can
still be accessed for reporting purposes. The reports created through
SiteProtector require the events to be present in the database when the reports
are generated. The data stored in the database has rollup levels. Long term
rollups take up little space, so long term trending is very easy. Medium term
analysis is possible without complete access to all of the event details for a
longer period of time. Since detail data takes up the most space, it should be
retained for the shortest period of time. Bearing this in mind, archived data
can be restored for inclusion in detailed reports.
Which database product is used for alert storage? Is schema open?
SQL Server 2000 is used. Yes, the schema is available to
customers.
What happens when communications between sensor and management
server/console are interrupted? Local logging on sensor? Maximum capacity? What
happens when local sensor logs are full? Is the local repository secure?
If connectivity between the sensor and the event collector is
disrupted, the event data is stored locally on the sensor until connection is
re-established. If connectivity between the event collector and the console is
disrupted, the events are stored locally on the event collector until the
connectivity is restored to the console at which time the events will appear on
the console as determined by the security policy in effect. The console does
not need to be operational in order for the events to be stored. When
connectivity to any RealSecure component is lost (other than the console
itself), a sensor warning alert is sent to the console. In short, the system
fully recovers from these outages automatically. The only way to lose data is
for the connection to go down for so long that the sensor storage limits are
exceeded (configurable up to disk limits).
Secure logon for policy management?
Yes, Windows authentication is used to limit access to the
RealSecure components.
Granular access (i.e. read only/read-write/etc) granted on a
per-user basis? What levels of granularity are supported?
SiteProtector has granular user control in that multiple roles
can be created under different user accounts to prohibit certain administrative
functions. For example, one user account may only be able to view events while
another is able to view events and modify policy while yet another is able to do
both plus start, stop, and deploy sensors.
Is it possible to define multiple policies for the sole purpose
of distributing to multiple sensors with different functions?
Yes, users may create custom policies and push them out to
various sensors. For example, a DMZ policy can be created and pushed out to the
DMZ segments while an External Net policy can be created and pushed out to
segments beyond the DMZs and/or segments not firewalled at all to cover all
points of entry into the network from the internet.
How are policies distributed to sensors?
Policies are distributed to sensors from the SiteProtector
central console.
Can policies be deployed on a per-sensor or per-group basis, or
globally only?
Yes. Policies can be deployed in all three of these ways.
How are policy changes handled? Will the central console detect
which agents are using a changed policy and redeploy automatically, or does the
administrator have to do this manually?
RealSecure policies are highly configurable. Individual
signatures can be enabled and responses set optimally for a customer�s
environment. Policy is centrally managed and is controlled by user roles. Users
can only change policy if they are authorized to do so. The sensors send
notification when a new policy is applied. If a policy is inadvertently applied
to a sensor or group of sensors by an authorized user, that active policy is
displayed at the console, and the original policy can be easily redeployed to
that sensor or group of sensors. The Console will notify the administrator which
Sensors are using the changed Policy and provide the option to deploy to all
Sensors in a single operation.
Can policy deployment be scheduled?
Yes, policy deployments can be scheduled through SiteProtector.
Does the sensor remain able to detect alerts at all times during policy/signature updates? Explain how this is achieved. The sensor goes offline briefly, but this can be scheduled to occur at a low risk time of day. For policy updates, it takes less than five seconds and for signature updates, it takes less than 20 seconds.
Can the administrator define custom attack signatures?
Yes, custom signatures can be created using the TRONS module
which accepts open-source (Snort) syntax rules These rules are created using
the console GUI and a validation tool verifies the syntax before the rule is
applied to a policy.
Regex supported when creating custom signatures?
Yes, regular expressions are supported.
How are new vendor attack signatures obtained and deployed?
New signatures are added using the X-Press Update (XPU)
technology built into each ISS product by selecting the appropriate X-Press
Update option from the SiteProtector console. RealSecure then accesses the ISS
web site, downloads any new updates, and applies them to the sensor policies as
specified. The updated policies are then pushed out to the sensors all at once,
by groups, or by individual sensor. Updates can also be downloaded to another
system and manually copied to the SiteProtector console machine should the
console not have internet access.
Frequency of signature updates?
Because of the protocol analysis module built-in to the sensor, a
signature update is not necessarily required for every new threat that is
discovered. Many previously unknown threats that RealSecure detected before
they were given a specific name include: .printer overflow, rpc.statd
format-string attack, DNS TSIG overflow, Telnet buffer overflow, UTF8 (used by
Nimda), .ida overflow (used by Code Red), BSD-based telnet overflow, SysV telnet
overflow, several SNMP vulnerabilities, Jolt and Jolt2, SQL Slammer, and many
others. Beyond the standard HTTP, SMTP, FTP, Telnet, SNMP, ICMP, etc. protocol
analysis intelligently monitors TFTP, IMAP4, POP3, MIME, DHCP, SOCKS, bootparam,
rusers,ypupdate, finger, NetMeeting, Rsh, cmsd, Gopher, ssh, rlogin, ICQ, statd,
nfs, portmapper, and unknown buffer overflow attacks. X-Press Updates are
still developed on a monthly basis, either to add more decodes or as service
releases based on customer feedback through our technical support channel.
Emergency updates are also developed for those new threats not already covered.
What infrastructure does the vendor have behind the signature
update process (i.e. dedicated team of engineers? How many? Does it have a
name?)
X-Force, a team of approximately 150 security engineers, is
responsible for the security content and update process and prioritization
across all ISS products and services.
Can one signature update file be downloaded to the local network
and used to update all IDS engines from a central location, or is it necessary
to initiate a live connection to the Internet download server for each
sensor/management server?
Yes, a live internet connection is not necessary as there is also
a manual process available. One update can be applied to all sensors
simultaneously.
Can signature updates be scheduled and fully automated?
Yes, signature updates can be initiated by the user or can be
scheduled using SiteProtector.
Which network types are supported by the sensor?
RealSecure Network Gigabit supports gigabit ethernet networks.
What network protocols are analysed?
RealSecure Network Gigabit fully analyzes and decodes the
following network and application protocols: 802.1q, 802.2, 802.3, 802.3u,
802.3z, 802.5, aolim, arp, automount, backorifice, bgp, bo2k, bootp, bootparam,
cmsd, dhcp, dns, email, fddi, finger, fsp, ftp, gnutella, h245, http, icecap,
icmp, ident, igmp, imap4, ip, ipv6, irc, java, lanman, ldap, lpr, mime, mms,
mountd, mpls, ms_messenger, msrpc, napster, netbios, nfs, nis, nntp, pcanywhere,
pcnfsd, pop3, portmapper, pppoe, pptp, q931, quake, radius, rexec, rfb, rip,
rlogin, rsh, rtsp, selnsvc, sgifam, smb, smtp, snmp, snmpxdmid, sntp, socks,
sql_server, ssh, ssl, statd, subseven, sunadmind, sunrpc, syslog, talk, tcp,
telnet, tftp, tooltalk, udp, url, virus, xdmcp, xfs, xml, yahoo_messenger,
ypbind, yppasswdd, and ypupdated.
What application-level protocols are analysed?
See above.
Can the product perform protocol decodes?
Yes, ISS uses a common Protection Engine across its network,
server, and desktop agents to detect, prevent, and respond to known and unknown
threats. One component of this engine is the protocol analysis module which
performs 7-layer, state-based protocol decoding, validation, and anomaly
detection. Using packet captures, the entire decode is made available to the
user. Also, it can create many decode files and save them separately based upon
the configured response to certain events. This protocol decoding is especially
effective for detecting previously unknown threats since it focuses on the
underlying vulnerability rather than a specific exploit of the vulnerability.
An example of this is the detection of the underlying vulnerability that was
exploited by SQL Slammer. Without requiring a signature update, RealSecure
detected this as SQL_SSRP_StackBo which indicated that the underlying stack
buffer overflow vulnerability of SQL Server was being exploited. Less than a
few hours later, this exploit was named �SQL Slammer� and RealSecure was then
updated to include a decode name for that specific exploit. Should another new
attack attempt to exploit the same SQL vulnerability, the SQL_SSRP_StackBo event
would once again be triggered and the attack stopped depending on the
pre-defined configured response. This illustrates the advantage of protocol
decoding over pure pattern-match signatures which are written for specific
exploits rather than the underlying vulnerability.
Can the product perform protocol anomaly detection?
Yes, the protocol analysis module within the Protection Engine
does protocol anomaly detection by performing protocol validation and RFC
compliance checking. However, since some protocol anomalies do not necessarily
constitute an attack, RealSecure is able to distinguish between a non-compliance
and an actual intrusion attempt or malicious activity. Since many protocol
anomalies are benign, RealSecure focuses its anomaly detection on those areas
that are most likely to indicate an attack so as to avoid false alarms yet
trigger on previously unknown threats.
Is the detection engine �stateful�? If so, please explain how
this works.
Yes, the Protection Engine performs state-based packet
inspection, protocol analysis, protocol anomaly detection, pattern-matching,
decoding of backdoor communications/protocols, multi-format Unicode URL
decoding, port-independent protocol detection and decoding, attack verification
using target host responses, TCP reassembly, and IP defragmentation. Stateful
packet inspection technology means that the sensor doesn�t just match patterns
to a single packet but rather stores the data stream in a state table on a
packet-to-packet basis. For example, it can determine the success or failure of
HTTP attacks using stateful inspection.
If stateful - how many open connections can be tracked? Is this
value configurable?
The default limit is 500,000 connections. This is configurable
to over a million which would likely require more memory in the sensor than the
minimum system requirements (4gb is recommended). Using the Security Fusion
module with SiteProtector, the views can be configured to display only attacks
made against a vulnerable target while suppressing those made against
non-vulnerable targets. Yes, this behavior is completely configurable and can
be modified to alert on all attacks if desired, regardless of the vulnerability
state of the target.
If stateful - for how long are partially opened connections
tracked? Is this configurable?
These are not tracked or counted separately, but there are
safeguards, such as the coelescer and noise threshold parameters, to prevent
resource exhaustion from syn attacks or other flood-type denial of service
attempts or network anomalies.
If stateful - for how long are fully opened connections tracked
if not used? Is this configurable?
The default timeout is 5 minutes assuming the connection is not
closed gracefully. This is configurable.
If stateful � explain the behaviour of the system when the state
tables are filled
In the general case, new connections are dropped. In the case of
IP defragmentation and TCP reassembly, an event is reported and the reassembly
pool is flushed.
Will the detection engine alert on ALL suspicious activity, or
only when an attack is made against a vulnerable server? If so, please explain
in detail how this works. Can this behaviour be modified (i.e. to alert on ALL
attacks if required)?
Using the optional Security Fusion module with SiteProtector, the
views can be configured to display only attacks made against a vulnerable target
while suppressing those made against non-vulnerable targets. Yes, this behavior
is completely configurable and can be modified to alert on all attacks if
desired, regardless of the state of the target. There are also parameters in
that can be set for each signature to adjust noise thresholds so that an event
is displayed only once to the console under certain conditions in order to
minimize the number of events the user has to process. These advanced tuning
parameters have several adjustable fields to filter or display events to and/or
from a specific host or IP address/range.
Are server responses monitored and alerted upon?
Yes. This is referred to as �attack verification.�
Ability to monitor user-defined connections (i.e. report on an
FTP connection to a specific server?)
Yes.
Detect network-level packet based attacks?
Yes.
Detect all types of port scans (full connect, SYN stealth, FIN
stealth, UDP)?
Yes.
Detect SYN floods? Manual or automatic thresholds? Configurable?
Yes.
Perform packet/stream reassembly?
Yes.
Perform deobfuscation?
Yes, evasion techniques that obfuscate malicious traffic are not
successful against RealSecure. This is configurable. In some cases, an evasion
technique is taken so far that the receiving host can no longer piece it
together as an attack. This is something that is tunable in RealSecure.
Examples are favoring new or old TCP data in an overlap connection. Or,
RealSecure can deal with the overlap, small frames, and time delay, but if there
are too many small, overlapped frames with too much time in between, the
receiving host will drop it since it no longer constitutes an attack.
List all �prevention� features available (TCP reset, ICMP
unreachable, firewall reconfiguration, drop packets (in-line only))
RealSecure can terminate sessions via a TCP RST sent to both
hosts in the conversation. It can also dynamically reconfigure a Check Point
FW-1 via the OPSEC response. This will add a rule to the firewall policy for a
configurable about of time to terminate the existing session and drop packets
from the attacking source for a pre-defined period of time or for an indefinite
period of time. RealSecure can also communicate with other infrastructure
devices via a user-defined response. An example is that it can modify the ACL
on a router using EXPECT scripts to block connections based on protocol,
service, and/or IP address/range.
Packet capture capabilities? Only the trigger packet, or before
and after? How are packet captures stored/viewed?
RealSecure has two options for capturing packets: Evidence
Logging and Packet Logging. The Evidence Logging response stores the exact
packet that triggered the event in a file by itself at the sensor.
Option to record entire sessions for �forensic� investigation?
Where is this data stored? How is it secured from tampering?
Packet Logging stores all packets surrounding an event in a
circular queue of files stored at the sensor. Storage limits are configurable.
It�s secured by standard OS authentication to that system.
Reporting from sensor to console - range of alert response
options (detail these, i.e. log, alert, e-mail, pager, packet capture, etc)
There are
several actions that can be configured in the security policy on a per event
basis. Responses to events include: RSKill (TCP RST response), sending an alert
to the console or to multiple consoles, sending an SNMP trap to a 3rd party trap
handler, reconfiguring a Check Point FW-1 rule base, logging a summary of the
event in the database (with or without raw), email notification to one or more
mail addresses or distribution lists, and executing a user-defined program.
Can alert response options be set only at a global policy level,
only at individual signature level, or to groups of signatures (or a mixture of
all three)?
Responses are configurable on a per event basis. They can also
be globally applied to many sensors at once, but not to just a group of
signatures at once.
Can alerts be reported to the central console in real time
without the use of third party software? How easy is it to filter and extract
individual events?
Yes, alerts are sent to the SiteProtector console in real-time
without any third-party software. It is easy to filter and extract individual
events and drilldown to specific incidents using on attack pattern recognition
and impact analysis features.
Can alerts from all sensors be viewed at a single console at the
same time (i.e. without having to connect to separate sensors from the console)?
Yes, all events are transmitted to SiteProtector in real-time
from the Event Collectors of all managed sensors after logic, analysis, and
correlation are applied. These events are all stored in the Enterprise Database
for historic and real-time viewing.
Can the central console correlate alerts from multiple sensors
(i.e. not just display alerts from multiple sensors, but attempt to infer a
connection between different alerts on different sensors)?
Yes, SiteProtector with the Security Fusion module offers attack
pattern recognition which correlates events from multiple sensors to discover
relationships between events and determine whether a coordinated attack is
occurring.
Can alerts be correlated manually by the administrator - grouped
together in the database as a single event for further investigation?
Yes, events can be correlated manually or using the built-in
logic that is available with the Security Fusion module. There is also native
drilldown capability from within SiteProtector. Events can be correlated on
many fields, such as source IP, destination IP, type event type, time, date,
etc. Many events can be filtered down to just a few actionable incidents
automatically so that the administrator is able to quickly respond to high
priority incidents rather than trying to sift through thousands of events.
Can alerts/events be annotated and tracked for investigation by
multiple administrators/investigators?
Yes, using the incidents functionality users can track events and
add notations describing any actions taken to resolve the incident. Viewing
events is done through a console whose access is managed through group
membership which also provides for role- based permissions within the
management/analysis console.
Does the software offer advice on preventative action to ensure
the attack does not happen again?
Yes, all events are thoroughly detailed by X-Force and searchable
in the online help along with what OSes are effected, the severity of the event,
any known false positive or false alarm conditions, the corrective action
recommended, and links to CERT advisories, CVE-correlations, OS vendors, and
other related information.
What
industry standards are supported - Intrusion Detection Exchange Format working
group (IDWG), Intrusion Alert Protocol (IAP), Intrusion Detection Message
Exchange Format (IDMEF), IDXP - and in what way?
ISS X-Force are founding members of the IDMEF working group.
However, this standard has not yet been adopted by the industry.
Which third
party event correlation systems are supported and in what way?
There are several third party vendors that receive events from
RealSecure Network such as netForensics, Symantec ManHunt, Arcsight, Guardednet
NeuSecure, as well as many others.
Integration with other scanning/IDS products?
Yes, RealSecure is able to import open-source (Snort) signatures
via the TRONS utility. It is also integrated with Internet Scanner via the
Security Fusion module to reveal whether an attack was successful based on the
vulnerability state of the target. This required an in-depth analysis and
mapping of the implementation of an Internet Scanner vulnerability check and
it�s relationship to the directionality, port, etc. of the IDS signature.
Currently, the Security Fusion module is able to correlate nearly 800 RealSecure
events with Internet Scanner vulnerability checks. Other types of correlations
include events from RealSecure Server and System Scanner agents. RealSecure
Network and Gigabit Network are also integrated with RealSecure Desktop via the
SiteProtector management platform.
Log file maintenance � automatic rotation, archiving, reporting
from archived logs, etc.
Data archival is possible through the use of SQL server backup
and restore options, however there is not a a built-in mechanism within
SiteProtector for archiving and recovering data.
Management reporting � range of reports/custom reports/how easy
is it to filter and extract detail? Different reports for technicians and
management/end users?
Yes, this is quite simple as all data is transmitted from the
Event Collector to the SQL or MSDE Database. Granular, specialized reports can
be easily created directly from the database, a free utility called FastReports,
and /or Crystal Reports. SiteProtector data views can be exported to CSV files
for specialized reports creation. There are also several built-in reports that
can be exported to other formats as of version 2.0.
Are trend/comparison reports available?
Yes, trend analysis and comparison reports are built-in.
Does reporting allow customised filtering down to the level of
reporting all activity on a specific network resource/object by a specific
user/machine on a specific date?
Yes, all views are fully customizable as are several types of
reports. Extensive drilldown capability quickly reveals attack patterns,
coordinated attacks, vulnerable targets, etc.
Report management � can they be scheduled for automatic
production? Can they be e-mailed to administrators or published straight to a
Web site?
SiteProtector provides the ability to schedule reports to be
pushed to a web site. Additional scripting would be required to automatically
email the reports.
What are the limitations and restrictions on enterprise-wide
alerting and reporting? Can reports consolidate output from every 1) server, 2)
detector
Yes, events from multiple sensors can be filtered, aggregated,
consolidated, and correlated into various real-time and historic views which can
then be exported to CSV files. SiteProtector also offers event and
vulnerability information from network and host vulnerability assessment and
desktop firewall/intrusion detection components.
Ability to define custom reports?
Yes, reports can be created and/or customized by the user. This
is in addition to the default reports that ship with the product. Console
views can be stored as formatted reports and generated immediately or on a
scheduled basis.
Provide brief description of any management software included in
the base price of the product.
SiteProtector is a centralized management platform that
integrates network, server, and desktop protection agents for dynamic detection,
prevention, and response to known and unknown threats across a geographically
dispersed, heterogeneous digital environment.
Provide brief description of any additional management products
available as extra cost options.
SiteProtector works with the Security Fusion module, which is an
add-on option but not a requirement. It enables IDS/VA/OS correlation into a
single, asset-oriented context thus minimizing the number of events displayed to
the user. It checks incoming IDS events against vulnerabilities and operating
systems discovered to immediately estimate the impact (success or failure) of
attacks. It can automatically escalate these important events, by increasing
event priority and/or by responding with additional actions (such as email or
paging).
Security Fusion 2.0 provides attack pattern analysis on nearly 800 security checks. It ships with attack pattern signatures that will automatically escalate critical patterns of attacks to create actionable incidents.
Documentation provided
RealSecure Network Gigabit includes the following documentation,
either hardcopy, online, or both: RealSecure Network & Gigabit Network
Installation Guide, Policy Guide, Migration Guide, FAQ, Product Spec Sheet, and
System Requirements. Additionally, SiteProtector includes the following
documentation, either hardcopy, online, or both: Installation and Configuration
Guide, Reference Guide, Strategy Guide, Troubleshooting Guide, Upgrading to
SiteProtector 2.0 Guide, and Product Spec Sheet. If the Security Fusion module
is purchased, additional documentation includes: Security Fusion Module FAQ,
Datasheet, Reference Guide, and System Requirements.
How is the product licensed? How is the license enforced?
Each license key contains fields for the components purchased and
is not restricted in any way by IP address, network, or host name. Instead,
the key restricts functionality based on the number and type of sensors, number
and type of managers, and number of assets correlated by the Security Fusion
module. The license key resides on the SiteProtector console.
End user pricing information
RealSecure Network Gigabit is priced at $26,996. It�s
maintenance is priced at 20% which equates to $4999.20. The Security Fusion
module is priced at $145 per managed asset. Future versions of RealSecure
software and Proventia appliances split maintenance into technical
support/service and security content price points.
Ongoing cost of maintenance/updates
RealSecure Network Gigabit maintenance should be renewed on an
annual basis but this is not mandatory. Currently, maintenance includes product
updates, service releases, security content updates, 24x7x365 technical support
(both email and phone support), and access to the Technical Support Customer
Knowledge Base for self-serve problem resolution. Platinum Technical Support
can be purchased at an additional cost. Security Content for Proventia
appliances and other future ISS products will be a separate cost, thus reducing
the cost of pure support.
Click here to return to
the ISS Real Secure Review
Click here to return to the IDS Index Section
Send mail to webmaster
with questions or
|