NSS Group logo

Entercept 2.01

Brief product description
Entercept Web Server Edition:- provides protection for critical Web servers and their applications. This solution stops both known and unknown attacks and creates a secure environment for your Web servers and applications. It is the ultimate protection for Web servers.

Entercept Standard Edition:- provides protection for all other critical e-business servers. Using an extensive intrusion dictionary and an exclusive behavior model, Entercept can identify and stop generic and specific intrusions. It gives companies unparalleled protection at the operating system level.

Architecture
Host based Agent (1 per server) reporting to single management and reporting Console over any IP based network. Console manages up to 1000 agents.

At what layer of the protocol stack is the product working?
After the stack and after decryption.

Documentation
"Reviewers Guide", "Quick Start", "User Guide". Online or CD.

What are the minimum/recommended console OS and hardware requirements? 
Is a dedicated machine required/recommended? 
Will it work on Windows 2000?
A dedicated machine is recommended for the console.
Console Installation Requirements
Windows NT 4.0 Server (SP4 or later)
Windows NT 4.0 Enterprise Server (SP4 or later)
Windows 2000 Server (no SP, SP1, SP2)
Windows 2000 Advanced Server (no SP, SP1, SP2)
Internet Explorer 4 (SP2 or later) or 5
Single or multiple Pentium-III�, 450 MHz or faster
Min. 128 MB RAM
Min. 100 MB free disk space
Administrative access to computer
TCP/IP
A static IP address

What are the minimum/recommended agent OS and hardware requirements? 
Is a dedicated machine required/recommended? 
Will it work on Windows 2000?
A dedicated machine is not necessary.
Servers supported - Windows 2000, NT, and Solaris.
Webservers supported -  IIS, Apache, NES, iPlanet.
Agent Install Requirements(W2k)
Windows 2000 Professional (no SP, SP1,SP2)
Windows 2000 Server (no SP, SP1, SP2)
Windows 2000 Advanced Server (no SP, SP1, SP2)
Single or multiple Pentium� processors, 200 MHz or faster
Min. 64 MB RAM
4MB disk space
Administrative access to computer
TCP/IP
Agent Install Requirements(Solaris)
Solaris 2.6, Solaris 7�, Solaris 8�
UltraSparc processor
32-bit kernel
64-bit kernel
Min. 64 MB RAM
Administrative access to computer
TCP/IP

What components are installed on a detector
N/A - Host based system

Which network types are supported
N/A - Host based system

Any specific recommendations for monitoring Gigabit networks with your product?
N/A - Host based system

Which OS platforms are actively monitored?
Windows 2000, NT, and Solaris

Can sensors/detectors be deployed and configured initially from a central console?
Agents are deployed via a simple installer taking approx. 5 minutes to complete, or can be included as part of a standard build 'image'.

Once deployed and configured, can sensors/detectors be managed from a central console?
Yes, managed and updated, via the management console.

Authentication between console and engines � Is it available? What algorithm/key lengths?
Yes, the scheme used is asymmetric cryptography (also called Public Key cryptography). The 168-bit session key uses Triple-DES algorithm.

Secure logon for policy management?
Yes, via seperate Entercept controlled login

How are policies distributed to engines?
On automatic update from the console.

How are policy changes handled? Will the central console detect which agents are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
All poilicy changes are made from the Management Console and automatically distributed to each of the Agent groups.

How many attack signatures?
Attacks are actively detected and prevented via reference to Rule Sets which define malicious activity. Known attacks prevented by Entercept is in excess of 500+.  Unknown, or as yet to be defined attacks will also prevented.

Can the administrator define custom attack signatures?
Planned in future release.

How are new attack signatures obtained and deployed? 
Automatically downloaded from the Entercept 'Instant Update' servers. Then automatically deployed to Agents from console. Administrator has option to test new update prior to deployment.

Frequency of signature updates? Provide dates of all updates in the last year.
Monthly, or more often as required

What infrastructure do you have behind the signature update process
A dedicated team of software engineers. The 'eKat Team'

Can one signature update file be downloaded to the local network and used to update all IDS engines from a central location, or is it necessary to initiate a live connection to the Internet download server for each engine?
N/A - Host based system

Can signature updates be scheduled and fully automated?
Fully automated

What network protocols are analysed?
N/A - Host based system

What application-level protocols are analysed?
Protocol analysis not required

Can the product perform protocol decodes?
Protocol analysis not required

Can the product perform session recording on suspect sessions?
Not necessary, malicious sessions are prevented from initiating. Full detail is logged.

Block/tear down session?
Not necessary, malicious sessions are prevented from initiating.

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
N/A - Host based system

Monitor changes in critical system files?
Yes, and prevent if required

Monitor changes in user-defined files?
In future release.

Monitor changes in Registry?
Yes, and prevent if required

Monitor unauthorised access to files?
Yes, and prevent if required

Monitor administrator activity (creation of new users, etc)?
Yes, and prevent if required

Monitor excessive failed logins?
Yes these are detected and logged

List any other resources/locations that are monitored.
N/A

Track successful logins, monitoring subsequent file activity, etc?
N/A

Detect network-level packet based attacks?
N/A - Host based system

Detect all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
N/A - Host based system

Detect and report on nmap OS fingerprinting?
N/A - Host based system

Perform packet reassembly? Resistance to known IDS evasion techniques?
N/A - Host based system

Reconfigure firewall? If so, which firewall(s) and how?
Not necessary, malicious sessions are prevented from initiating.

Option to record everything for �forensic� investigation? Where is this data stored? How is it secured from tampering?
Not necessary, sessions are prevented from initiating. Source of attack information is made available including source IP address. Data is stored centrally at the console.

Reporting from engine to console - range of action/alert options (detail these)
The major responses to malicious activity include 'Prevent' or 'Terminate Session' through to Log only.

Alerts can be sent out from the console via SNMP trap to enterprise management systems, or via email / pager notification.

What provision is made for temporary communications interruption between detector and console? Where are alerts stored? Is the repository secure?
Agent works completely self contained in the case of communications being lost, with events being stored locally. As communication is re-established the Agent automatically re-connects and delivers the events to the console.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
All events are sent immediately they occur. A range of filters are available to sort individual events.

Does the software offer advice on preventative action to ensure the attack does not happen again?
Entercept prevents the attack. A full description of the source and method of the attack is given.

Integration with other scanning/IDS products?
Preventative products do not require this level of integration

Log file maintenance � automatic rotation, archiving, reporting from archived logs, etc.
Full automatic archiving. Archive to standard XML - can use standard report tools.

Management reporting � range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
50 seperate built in report formats available including high level management overview graphics, through to detail of individual attacks for technical staff.

Report management � can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
No automatic function available in v 2.0

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
Yes, reports consolidate from all sources.

Define custom reports?
No. Although all reports are exportable in many formats for further customisation.

How is it licensed? How is the license enforced?
All licences are enabled, managed and enforced from the console.

Any other unique selling points?
Low CPU usage, unlike traditional HIDS products.

Cost of management is dramatically reduced due to automatic preventative action being taken and very low incidence of false positives.

Also offered as standard Cisco product:- "Cisco Host IDS Sensor"

End user pricing information 
Management Console                         �2,995                        (US$4,995)

Standard Server Agent                         �895                        (US$1,295)

Web Server Agent                             �1,095                        (US$1,595)

 Ongoing cost of maintenance/updates
On application

Click here to return to the Entercept 2.01 Review
Click here to return to the IDS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.