NSS Group logo

NFR Sentivist Smart Sensor V1.3

Is the product supplied as software only or as a hardware appliance? If supplied as an appliance, please provide the hardware specification (CPU, memory, network cards, etc)
Sentivist is available as an appliance and also in SW-only form for those customers who choose to source their own hardware. For the NSS test, Sentivist Smart Sensor 100C was supplied as an appliance.  The HW specification for the Smart Sensor 100C is as follows: 

-           1 x Intel SR1300 1U Server Chassis

-           1 x Intel SR1300 SCSI Backplane

-           1 x Intel SE7501WV2 Motherboard (SCSI variant)

-           1 x Intel Xeon Processor

-           2 x 1 Gbyte registered ECC DDR266 compliant low profile DIMM (2 Gbytes Total Memory)

-           1 x 36 Gbyte Seagate Cheetah 15k RPM SCSI Disk

-           1 x Interface Masters Niagara 2261 Dual Copper NIC with Integrated Bypass Capabilities

-           1 x Intel SR1300 CDROM/Floppy Drive Combo Module

-           1 x SR1300 Bracket Mounting Kit 

Does sensor work in-line only, or can it support passive monitoring of switch SPAN port too? If passive monitoring is supported, what is the maximum number of ports that can be monitored by a single sensor?
Sentivist Smart Sensors can be deployed any one of three ways.  First, they can be deployed in standard intrusion detection mode off a SPAN port or TAP in pure monitoring mode.  Second, in inline passive mode, also called “learning mode” whereby all suspicious traffic is alerted and traffic that would have been prevented in full inline mode, is flagged to the Sentivist Alert Console.  Third, Smart Sensors can be deployed in full inline intrusion prevention mode whereby attack traffic is blocked inline.  This multi-mode deployment gives users tremendous flexibility in deploying network security according to profile of their network and the priorities of their business. 

What is the maximum number of in-line connections (port pairs) that can be monitored by a single sensor?
Sentivist Smart Sensor 100C monitors a single network. 

What type (copper/fibre) and speed of network connection are supported by the sensor (include default configuration plus any options)?
Sentivist Smart Sensor 100C default configuration includes 4 10/100 copper interfaces. 

What High Availability (HA) features are built in to the product by default?
Sentivist Smart Sensors are designed to be able to fail over to a secondary Sentivist Server.  Specifically, at configuration time, Sentivist Smart Sensors report to a primary Sentivist Server which houses the Alert database.  Should that Sentivist Server go down for some reason, the Sentivist Smart Sensor will automatically failover and begin reporting to a secondary Sentivist Server thus real time alerting and reporting functionality continues un-interrupted. 

Further, Sentivist Servers are run on Highly Available hardware with recommended configurations that include RAID 10 and redundant power supplies. 

What High Availability (HA) features are available as extra cost options?
The high-end of the Sentivist sensor family, the Smart Sensor 500C which is an inline data rate of 500Mbps, Smart Sensor 1000C which is an inline data rate of 1G and the Smart Sensor 2000 which is an inline data rate of 2G all possess HA features.  These Smart Sensors are due to be delivered in Q32005 and possess dual power supplies, disk drives, interface cards as well as a redundancy option with A/A and A/S failover modes.    

What is the maximum speed/network load (Mbps) claimed with zero packet loss and without blocking legitimate traffic?
Sentivist Smart Sensor 100C delivers guaranteed 100Mbps of intrusion prevention data rates.  Internal tests with real world mixed traffic delivered data rates as high as 180Mbps. 

At the maximum load, what is the maximum TCP connection rate through the device (connections per second) claimed?
In a network with low-intensity traffic, Sentivist Smart Sensor 100C can handle approximately 500,000 simultaneous resident connections.  A network with a more typical traffic load, Sentivist Smart Sensor 100C can handle 5,000 - 10,000 connections per second before beginning to impact latency. 

What is the average latency claimed through the device (and at what load)?
The average latency for Sentivist Smart Sensor 100C conducting deep packet inspection and signature-based packet processing is typically between 40us and 1 ms. 

Additionally, Sentivist Smart Sensors allow Security Managers to configure a maximum acceptable latency.  When that threshold is surpassed, the sensor handles traffic according to the security policy defined by the Security Manager. 

Management architecture (2-tier/3-tier management? Brief description)
The Sentivist architecture supports small deployments and easily scales to support large enterprise deployments with centralized management and a unified view of data.  The two-tier architecture of the Sentivist client (formal name Sentivist Protection Center) and the Sentivist Server support small deployments and the three-tier architecture of the Sentivist client, Sentivist Enterprise Server and Sentivist Server provide the scaling and centralized data to support large enterprise deployments. 

What are the minimum/recommended sensor OS and hardware requirements? Is a dedicated machine required/recommended?
The Sentivist Smart Sensor OS is proprietary and since Smart Sensors are available as hardened appliances, customers are not required to maintain the OSs on each of their sensors. NFR’s Smart Sensor hw is a single 2.8Ghz processor with 2GB RAM.  All performance tests are based on this product spec.   

What are the minimum/recommended console OS and hardware requirements? Is a dedicated machine required/recommended?
The Sentivist Protection Center (client) can be installed on a typical office desktop or laptop computer running Windows, RedHat Linux or Sun Solaris. 

What are the minimum/recommended management server OS and hardware requirements (if applicable)? Is a dedicated machine required/recommended?
Sentivist Enterprise Server and Sentivist Server HW and OS recommended requirements: 

OS Requirements

          Redhat 9 or Enterprise Linux 3 (ES/AS)

          Solaris 8 or 9

 HW Requirements

          X86 configuration

o          2 x 3 Ghz or faster Intel Xeon processor

o          4Gbytes RAM

o          Minimum of four SCSI drives in a hardware RAID 0+1, 1+0 or 10 configuration (minimum 80   
       Gbytes usable)

o          10/100/1000 Ethernet network interface 

          Sun SPARC configuration

o          2 x 600 Mhz or faster SPARC processors

o          8 Gbytes of RAM

o          Minimum of four SCSI drives in a hardware RAID 0+1, 1+0 or 10 configuration (minimum 80Gbytes
       usable)

o          10/100/1000 Ethernet network interface 

Yes, a dedicated machine is recommended. 

List required open ports on sensor and their use
Sentivist Smart Sensors require port TCP/1968 for communications from the Sentivist Server. 

List required open ports on management server (if applicable) and their use
Sentivist Server requires the following ports:

          TCP/1968 for communications from Sentivist Smart Sensors

          TCP/2010 for communication from the Sentivist client (Protection Center)

          TCP/45678 for communication from the Sentivist Enterprise Server 

Sentivist Enterprise Server requires the following ports:

          TCP/5432 for DB/PostgreSQL access (default database)

          TCP/2848 for DB/Oracle access or 

List required open ports on GUI/management console and their use
The Sentivist Protection Center (client) does not require open ports.  The Protection Center communicates to the server via 2848 or 5432, depending on database choice. 

Communication protocol between sensor and management server
A proprietary, NFR Security developed protocol is used. 

Communication protocol between management server and GUI/console
A proprietary, NFR Security developed protocol is used. 

Encryption between sensor and management server
AES, CFB Mode, 128 bit keys 

Encryption between management server and GUI/console
Encryption between the Sentivist client and the Sentivist Enterprise Server is SSL encryption (128 by default). 

Once deployed and configured, can sensors be managed from a central console?
Scalability and centralized management is a key strength of Sentivist.  The Sentivist architecture is designed specifically to support centralized management and a single unified view of data for any size network deployment.  An entire enterprise deployment can be managed from a single Sentivist laptop client to define and push policy to all Smart Sensors, receive alerts and generate reports.   

Capacity of the system? How many endpoints can be monitored? Ratio of endpoints to management servers/consoles, etc.
Sentivist can manage large scale enterprise deployments with an unlimited number of endpoints.  The number of Smart Sensors the Sentivist Server can manage is dependent on the network traffic load and traffic type.  The standard ratio for a high-use, mixed traffic network is ten Smart Sensors per Sentivist Server, but varies from deployment to deployment. 

Thus Smart Sensors in groups of ten report to Sentivist Servers which report to the Sentivist Enterprise Server.  The Enterprise Server provides the central management point and unified view of data for centralized management and single point of control.  

                                                     Sentivist Client

                                                                /

                                         Sentivist Enterprise Server

                                                     /                       /

                                                     /                       /

                             Sentivist Server-1……Sentivist Server-N

                             /                       /                       /                       /

                             /                       /                       /                       /

     Smart Sensor-1…………SS-N           SS-1………….SS-N

How many management consoles can be actively logged in to the management server at the same time?
Sentivist supports multiple, concurrent management sessions and does not have a fixed limit to the number of Sentivist clients that can be logged in concurrently.  There is no default timeout. 

What anti-flooding methods are employed (sensor to management server, and management server to console)?
Sentivist Smart Sensors utilize Alert Flood Suppression to consolidate like alerts into a single alert notification to the Sentivist Server.  Alert counts are maintained and communicated forward to ultimately be displayed on the Sentivist Alert Console.  So for example, if a Smart Sensor were to suddenly see a flood of anomalous traffic, triggering the “nonsense” alert, once the number of “nonsense” alerts hit a user-definable threshold (default being 200 in 5 minutes ) the sensor would stop sending the flood of  “nonsense” alerts.  It would instead, count the “nonsense” alerts, and then send a single alert, telling the end user that they had nnn “nonsense” alerts in the last n minutes.  When the flood was over, a final alert would be generated, informing the end user of the total alert count from the flood. 

An additional anti-flood system is called Alert Consolidation.  On the Sentivist client, when duplicate alerts, from/to the same IP addresses appear in a 3 minute moving window, those alerts are not displayed separately.  Instead, a counter is incremented next to the original alert.  The end user can then drill down into that alert to see all the consolidated alerts.  This helps display more information on the end users screen at a given point in time. 

Maximum insertion rate into alerts database
Maximum database insertion rate at the Sentivist Enterprise Server is 1000 alerts per minute.  This number can be increased by using faster hardware, but this number was achieved using the standard recommended server hardware configuration. 

Maximum size of database
Though there is no set maximum, NFR Security’s recommended maximum is 40GB using postgreSQL.

Maximum number of alerts stored
With an average Alert record size of 1k, the maximum number of Alerts is approx 40 million. 

What happens to alerts in main alert database once capacity limits exceeded (deleted/archived/etc)
On the Sentivist Server, the oldest events are purged first.  Security Manager’s can specify a preference to retain certain types of records longer than others, and the purging process honors these preferences, unless more space is required to operate. 

What is maximum recommended size of alerts database to maintain acceptable query performance?
As per the second prior question, approx 40 million. 

When alerts are removed from main alert database, are they still available for reporting directly (i.e. can reporting tools merge current and archived alerts)
On the Sentivist Enterprise Server, Security Managers can export their alert data for long-term storage and data mining, trending and reporting. 

Which database product is used for alert storage? Is schema open?
On the Sentivist Enterprise Console Server, postgreSQL is used, with an open schema. 

What happens when communications between sensor and management server/console are interrupted? Local logging on sensor? Maximum capacity? What happens when local sensor logs are full? Is the local repository secure?
When communications between the Sentivist Server and Sentivist Smart Sensors is severed, data will accumulate until disk space is exhausted at which time new data will be dropped.  There is also an option to purge old data on the Smart Sensor.  The current hard drive shipped with the Sensor is a 36GB drive.  Theoretically, this could be months worth of data (millions of records).  The data is on a local subsystem with no UNIX services or shell.  Somebody would need to physically remove the hard drive and mount it on a separate machine, then figure out our hashing algorhythm to read the data. 

Secure logon for policy management?
Yes.  Policy is defined, deployed and managed through the Sentivist client which requires password protected logon access.  Further, traffic between components is encrypted. 

Granular access (i.e. read only/read-write/etc) granted on a per-user basis? What levels of granularity are supported (i.e. is it possible to restrict user access to specific parts of the management console, to specific appliances, etc.)?
Yes, Sentivist supports granular access controls.  Users can be given Admin access (which is the ability to view and configure everything), or they can be restricted to various alert views.  For example, Joe SOC person can only view alerts;  Jane web admin, can only view alerts from the sensor in the web DMZ, etc. 

Is it possible to define multiple policies for the sole purpose of distributing to multiple sensors with different functions?
Yes.  Sentivist Smart Sensors can be grouped together and then managed by that group.  You can create subgroups as well.  For example, you might put all your DMZ sensors in the DMZ group.  You might put your internal userland sensors in the USERLAND group.  You might create a location group called US, and another called EU, and then create subgroups under each of those called DMZ and USERLAND, and then places sensors in those groups.  Sensors can be told to inherit policy settings from groups above them, or they can override a group setting.  A change can be made to a policy at the top, and that policy (or a portion of that policy) can be pushed down to every group/subgroup/sensor in the policy tree.   Policy definition and deployment is very hierarchical. 

How are policies distributed to sensors?
Sentivist policy distribution is very simple.  The user defines the policy via the Policy Manager function of the Sentivist client software.  After the user makes all the wanted changes, they click OK, and the policy is pushed to the Smart Sensors and the Smart Sensors respond with a message confirming the policy has been received and implemented. 

Can policies be deployed on a per-port, per-sensor or per-group basis, or globally only?
Policies can be deployed globally, per-group, or per-sensor.  They can not be deployed on a per-port basis.  The current Sentivist Smart Sensor 100 and 500 support a single port pair.  Sentivist MG Smart Sensors, planned to be available in Q32005, will have multiple port pairs per sensor, and per-port policies should be available at that point. 

How are policy changes handled? Will the central console detect which sensors are using a changed policy and redeploy automatically, or does the administrator have to do this manually?
Sentivist handles policy centrally and top down.  Sentivist allows policy definition and deployment by sensor group, thus Sentivist will not automatically redeploy policy to ensure policy consistency across all Smart Sensors. 

Can policy deployment be scheduled?
Not at this time. 

Does the sensor remain able to detect alerts at all times during policy/signature updates? If so, explain how this is achieved. If not, for how long is it inactive, and does the sensor block all or pass all traffic whilst inactive?
Yes.  Upon receiving policy updates, Sentivist Smart Sensors continue to operate while preparing the new policy for deployment.  When Smart Sensors deploy new policy, pause and queue incoming traffic until the deployment update is complete and then the Smart Sensor resumes traffic analysis.  The Smart Sensor is never inactive but rather paused for a split second. 

Can the administrator define custom attack signatures?
Yes.  Creating a new signature is point and click.  Users can enter strings into user definable variables to create new signatures for various protocols.  For example, to alert on the word “hackers” in an SMTP subject line is as simple as adding that string to the subject line variable in the SMTP package.   

For protocols not monitored by Sentivist, customers can create their own protocol decoders to fully decode that protocol.  Using Sentivist’s custom signature language, N-code, Security Managers can write their own signatures as well as modify signatures produced by NFR Security.  N-Code is an open language similar to perl.  The N-Code development environment is distributed for free and includes a test compiler and a light-weight virtual machine.  This allows customers to develop and test custom signatures against real traffic without having to purchase another Sentivist solely for this purpose.   NFR teaches a two-day class on N-Code and at the end of the class, they write a protocol decoder to monitor the “Chess Rally 2” game and alert on checkmates and bad words used in the chatrooms. 

Regex supported when creating custom signatures?
Yes.  A customer can do anything with NFR Security’s N-Code signature language, including regex.  In the user defined “point and click” variables, this is not an option currently. 

How are new vendor attack signatures obtained and deployed?
NFR Security signatures are available on the NFR Security Package Server and the NFR Security Support Web Site.  Both sites are updated daily with the latest signatures and protection information.  Customers who configure their Enterprise Console Client to have direct Internet connectivity can connect to the NFR Security Package Server to access the latest signatures.

Otherwise, via their web browser, customers can access the latest signatures from the NFR Security Support Web Site.  Also, signatures can be delivered on a CD as some of our customers occasionally request. 

Once received, signatures (and other updates) can be distributed and deployed to Smart Sensors worldwide from the Sentivist Enterprise Console (single, central console).

Frequency of signature updates?
NFR Security signatures are updated immediately upon the creation of new signatures, which is usually daily.  Other signatures, such as protection for emerging applications like Instant Messaging (IM) and VoIP are added to the product line as they are developed. 

What infrastructure does the vendor have behind the signature update process (i.e. dedicated team of engineers? How many? Does it have a name?)
NFR Security has a dedicated signature team called the Rapid Response Team that is comprised of a team of engineers with an average of 20 years experience in network security.  The team is constantly monitoring multiple mediums worldwide for clues and evidence of new threats and produces new signatures, vulnerability signatures and other services to protect NFR Security’s customers against these rising exploits. 

Can one signature update file be downloaded to the local network and used to update all sensors from a central location, or is it necessary to initiate a live connection to the Internet download server for each sensor/management server?
A key strength of Sentivist is its powerful centralized management functions.  All management and control functions are available via the Sentivist client, including the ability to manage signature updates and deployments. 

Can signature updates be scheduled and fully automated? Is automated download AND deployment to sensors supported, or just download (or neither)?
Not with current release. With the delivery of Sentivist 5.0 in Q32005, customers can configure Sentivist to automatically download new signatures immediately upon their availability.  Automation of the update can not be scheduled in the current release.   

What network protocols are analysed?
Sentivist analyses the following protocols:

DHCP
DNS
Finger
FTP
HTTP(S)
ICMP
IMAP
IP
IRC
LPD
MS-RPC
MSSQL
NNTP
ORACLE
POP
RADIUS
RLOGIN
RPC
RSH
SIP
SMB
SMTP
SNMP
TCP
Telnet
TFTP
UDP
WINS
Various P2P & IM 

What application-level protocols are analysed?
See above. 

Can the product perform protocol decodes?
Yes.  Everything listed above is a decoded (analyzed) protocol. 

Can the product perform protocol anomaly detection?
Yes, all protocol engines contain anomaly detection. 

Can sensor support both normal and asymmetric network configurations?
Sentivist Smart Sensors in inlne IPS mode must see symmetric traffic to function correctly.  It is a stateful device.   Smart Sensors in IDS mode can aggregate several feeds to create symmetry, but the IPS device requires state to be present on a single line. 

Is the detection engine “stateful”? If so, please explain how this works.
Yes.  All analysis is done on fully reassembled connections.  The Smart Sensor can deduce state in the case of a cold-start with connections that existed before the sensor was booted.  The sensor can also resynchronize its internal state when routes flap and some packets took a different route to the end host than through the sensor. 

If stateful - how many open connections can be tracked? Is this value configurable?
Sentivist does not have a hard limit.  It is dependent on the amount of memory in the box.  On a typical network, the Sentivist Smart Sensor 100 will sustain between 5000-10,000 connections per second.   When it runs out of memory, connections are randomly discarded. 

If stateful - for how long are partially opened connections tracked? Is this configurable?
Sentivist Smart Sensors will track partially open connections until the sensor runs low on memory.  When memory does runs low, it drops partially open connections. 

If stateful - for how long are fully opened connections tracked if not used? Is this configurable?
When Smart Sensors run out of memory, connections are randomly discarded. 

What is the default action when system resources run low or state tables are filled - block or permit all new connections? Is this default action configurable?
The Security Manager can define the Smart Sensor’s default action to either permit or block all new connections.  

What is the default action when power fails or the system is powered down - block or permit all traffic? Is this default action configurable?
Sentivist Smart Sensors have an inherent network bypass capability that allows users to select the failure mode that fits their security policy.  The configurable options are for the device to fail unsevered (open) or severed (closed). 

What is the default action when the sensor is unavailable for any length of time (i.e. during policy download or software update - block or permit all traffic? Is this default action configurable?
Sentivist Smart Sensors default action corresponds to the default failure configuration as described in the prior question.

Will the detection engine block/alert on ALL suspicious activity, or only when an attack is made against a vulnerable server? If so, please explain in detail how this works. Can this behaviour be modified (i.e. to alert on ALL attacks if required)?
Sentivist offers multiple levels of protection and enforcement.  By default, Smart Sensors will alert on all suspicious activity and Sentivist’s patent-pending Confidence Indexing allows security mangers to define what types of suspicious traffic will be blocked at each location on the network.  The confidence index of a detected event is the system’s level of confidence that the event in question is an attack.  This allows Security Managers to implement prevention policy according to the business value of the service being protected.  For example, on a public information segment, the Security Manager may choose to block all suspicious traffic that have a confidence level of 90% or greater while a segment housing critical business information requires a more stringent level of prevention and thus the Security Manager would block all suspicious traffic with a confidence level of 75% or greater. 

Are server responses monitored and alerted/blocked? Does this have an impact on performance?
Yes.  This is required to catch various client side exploits, such as the GDI exploits against windows clients browsing the web. There is an impact on performance. 

Ability to monitor user-defined connections (i.e. report on an FTP connection to a specific server?)
Yes.  For example, by default Sentivist monitors all FTP connections, but if the user only wants to monitor a particular server or set of servers, that is also possible.   

Detect/block network-level packet based attacks?
Yes.  Sentivist will detect and block network-level packet based attacks. 

Detect/block all types of port scans (full connect, SYN stealth, FIN stealth, UDP)?
Yes.  Sentivist will detect all types of port scans.  Most scans can be blocked after an initial scan period. 

Detect/block SYN floods? Manual or automatic thresholds? Configurable? How is SYN flood protection implemented?
Yes.  Sentivist will detect SYN floods with default thresholds that are configurable by the user. No mitigation/protection, however. 

Perform packet/stream reassembly?
Yes. 

Perform deobfuscation?
Yes, Smart Sensors do a dehex and deutf8 on all files (such as a url). 

Is all traffic scrubbed/normalised/reordered as it passes through the sensor?
Yes.  Sentivist Smart Sensors normalize and scrub all TCP segmentation and IP fragmentation traffic. 

How is fragmented traffic handled by the sensor?
Fragmented traffic is buffered (but not beyond the configured max latency, default of 15 milliseconds) and re-assembled based on the fingerprinted OS of the destination IP address.  NFR Security’s Sentivist is still the only IPS/IDS product to use dynamic real-time OS Fingerprinting to properly re-assemble fragmented packets. 

List all prevention features available (alert only, drop packets, block TCP session)
Sentivist and Sentivist Smart Sensors use the following techniques:

o          Drop only

o          Pass and Track

o          Pass and Alert

o          Alert only

o          Drop packets

o          Block TCP sessions

o          Blacklisting 

List any other security features available (bandwidth shaping, rate limiting, etc.)
Sentivist offers: 

o          Meta Alert Correlation is a higher level of attack intelligence by correlating topologically discrete events that are otherwise similar, such as the Source IP address, and flags the alert set as a single higher severity Correlated Alert on the Sentivist Alert Console. 

o          Sentivist Dynamic Worm Mitigation utilizes statistical alert behaviour to identify and automatically quarantine rapidly, self-propagating 0-Day worms.  The ability to recognize these harmful 0-Day threats is critical to halting their rapid and damaging proliferation with the network. 

Packet capture capabilities? Only the trigger packet, or before and after? How are packet captures stored/viewed?
Yes.  Sentivist captures the triggering packet as well as subsequent packets (to a user-configurable threshold).  Packets are stored in the database, and viewed via ethereal. 

Do you track and display context data as part of each alert (i.e. for an FTP overflow, do you show which user name/password combination was used to login to the FTP server, etc?). If so, how much context data is available?
Yes, in some cases.  Not all alerts will have contextual data.  For the example in the question, Sentivist will record the username/password, and store it in a separate table for retrieval upon request. 

Option to record entire sessions for “forensic” investigation? Where is this data stored? How is it secured from tampering?
Yes.  If the user-configurable threshold is set to a high number of packets, Sentivist will store the entire session.   

Reporting from sensor to console - range of alert response options (detail these, i.e. log, alert, e-mail, pager, packet capture, etc)
Yes, Sentivist supports a variety of notification methods including:

o          Log

o          Email

o          Packet capture

o          Pager

o          SEMs including ArcSite, Intellitactics, NetForensics, among others.

o          SNMP

o          Syslog

o          anything that the Security Administrator can think of via the generic alerting mechanism. 

Can alert response options be set only at a global policy level, only at individual signature level, or to groups of signatures (or a mixture of all three)?
Sentivist alert responses can be global, by signature group, or per individual signature.

Can alerts be reported to the central console in real time without the use of third party software? How easy is it to filter and extract individual events?
Yes.  All alert and prevention activity from Smart Sensors are reported to the Sentivist centralized console, the Sentivist Protection Center.  The console displays three types of alerts, basic alert, correlated alerts and prevented alerts.  Security Managers can define filters to further customize the information that is displayed on the console and with simple point and click can isolate and drill down to the details of a particular alert.   

Can alerts from all sensors be viewed at a single console at the same time (i.e. without having to connect to separate sensors from the console)?
Yes.  Sentivist delivers centralized management, including a single a unified view of data from the smallest to the largest enterprise deployments of hundreds of Smart Sensors.  

Can the central console correlate alerts from multiple sensors (i.e. not just display alerts from multiple sensors, but attempt to infer a connection between different alerts on different sensors)? IS this offered as standard or extra-cost option?
Yes.  Sentivist includes Meta-Alert Correlation whereby Sentivist correlates topologically discrete but otherwise similar events and displays them on the Alert Console as higher severity Correlated Alerts.  This function gives Security Managers real-time insight into exploit attempts across their network that would otherwise take extensive log research to discover.   

Sentivist 5.0 which will be released in Q3 2005, further leverages Meta-Alert Correlation intelligence to Dynamically Shield against continued random exploit attempts from the same source IP address.  

Can alerts be correlated manually by the administrator - grouped together in the database as a single event for further investigation?
Yes.  Sentivist management console enables Security Managers to organize, sort and group alerts to manually investigate attack trends and activity. 

Can alerts/events be annotated and tracked for investigation by multiple administrators/investigators?
Yes. 

Does the software offer advice on preventative action to ensure the attack does not happen again?
Yes.  Sentivist Alert Details describe the alert, the impact of the alert impact, the vulnerability, and preventative action the customer can take to ensure the attack does not re-occur.  

What industry standards are supported - Intrusion Detection Exchange Format working group (IDWG), Intrusion Alert Protocol (IAP), Intrusion Detection Message Exchange Format (IDMEF), IDXP - and in what way?
Sentivist is CVE compliant. 

Which third party event correlation systems are supported and in what way?
Sentivist integrates with a number of third party event correlation products.  Sentivist alert information can be received by CA UniCenter, HP OpenView, IBM Tivoli, ArcSite, Intellitactics, NetForensics, Tenable and Symantec’s Universal Event Collector. 

Integration with other scanning/IDS/prevention products?
Sentivist 5.0 planned for delivery in Q32005 will receive the scan output file from Nessus, an open source network scanner sponsored by Tenable Security.  Sentivist will use this data to build network intelligence to offer Security Managers network service information, vulnerability information and correlated asset-vulnerability-attack information.  Further, Sentivist Dynamic Shielding will utilize the network intelligence to shield against new vulnerabilities introduced by network change and generic vulnerabilities in the network. 

Log file maintenance - automatic rotation, archiving, reporting from archived logs, etc.
The Sentivist log database will auto-purge itself when it approaches the maximum size threshold by deleting the oldest records first, to bring the database size down to an acceptable level. 

Management reporting - range of reports/custom reports/how easy is it to filter and extract detail? Different reports for technicians and management/end users?
Sentivist includes over 40 completely customizable Crystal Report Templates.  These include:

          Top/Bottom Alerts

          Top/Bottom Source/Dest IPs

          Top/Bottom Source/Dest Ports

          Top/Bottom Services

          Top/Bottom Sensors 

All Sentivist reports can be customized to analyze a subset of the data.  For example, the “Top N Alerts” could actually be “Top 10 Alerts, against port 80, against my DMZ range of IP addresses, from the China netblock, for the last 30 days”.  In addition, Sentivist contains a point and click management that highlights from all the Tops, as well as a general risk distribution. 

Are trend/comparison reports available?
Yes.  Sentivist includes a set of trending/comparison charts in the form of fully customizable Crystal Report Templates.  These include:

          Alerts by Date

          Alerts by Day of Week

          Alerts by Time of Day

          Alerts by Month

          Alerts by Service

          Alerts by Priority

          Among others 

As an example, “Alerts by Day of Week”, can be run for the most recent six month period.  This information would tell the Security Manager which days of the week his network is attacked the most. 

All Sentivist reports can be customized.  

Does reporting allow customised filtering down to the level of reporting all activity on a specific network resource/object by a specific user/machine on a specific date?
Yes. 

Report management - can they be scheduled for automatic production? Can they be e-mailed to administrators or published straight to a Web site?
Yes, with the Crystal Reports Enterprise Edition. 

List the output formats supported for reports (HTML, text, PDF, etc)
PDF, HTML, text, Excel, Word, XML, CSV 

What are the limitations and restrictions on enterprise-wide alerting and reporting? Can reports consolidate output from every 1) server, 2) detector
There are no limitations or restrictions.  Sentivist centralized management delivers a single a unified view of data from which enterprise-wide reports can be generated.

Ability to define custom reports?
Yes.  Sentivist utilizes Crystal Reports thus Security Managers have the ability to create their own reports. 

Provide brief description of any management software included in the base price of the product. 
The Sentivist management platform is priced separately. 

Provide brief description of any additional management products available as extra cost options. 
As mentioned above, the Sentivist management platform is priced separately and the pricing structure is available in the end user pricing information.  End users must also purchase a licensed copy of Crystal Reports.  (est. retail $500). 

Documentation provided (Hard copies available? Extra cost?)
Sentivist documentation is provided electronically free of charge.  Hard copy documentation is available for a nominal charge. 

How is the product licensed? How is the license enforced?
Licensing is centrally controlled, and is enforced based on the MAC address of the management NIC card of the Smart Sensor. 

End user pricing information for product provided for test (include all sensor, management server and console costs for both hardware AND software). Include options/configurations other than those tested - ALL PRICES AS LIST PRICE ONLY!
Pricing for the Sentivist product family is as follows: 

Management Platform

          Sentivist Office Management Platform (supports 1-3 Smart Sensors)                                   $10,000

          Sentivist Professional Management Platform (supports 4-10 Smart Sensors                           $18,000

          Sentivist Enterprise Management Platform (supports 11-30 Smart Sesnors)                           $30,000

          Sentivist Management Platform Increment (supports additional 10 Smart Sensors)                 $10,000 

Sentivist Smart Sensors

          Sentivist Smart Sensor
      100C                                                                                                                        $13,000

          Sentivist Smart Sensor
      500C                                                                                                                        $22,000

          Sentivist Smart Sensor
      500F                                                                                                                       $23,000 

Below is the pricing for the Sentivist system that was used at NSS: 

          Sentivist Office Management Platform (supports 1-3 Smart Sensors)                                   $10,000

          Sentivist Smart Sensor
      100C                                                                                                                        $13,000

Ongoing cost of maintenance/updates
NFR Security Signatures, Support and Maintenance costs are as follows: 

          Standard Signatures, Support and Maintenance is 20%

o          Includes NFR Security Rapid Response Team signature support.

o          Standard level customer support is available 9AM-6PM EST, M-F, excluding holidays.

o          Includes HW warranty of one year with advanced replacement.

o          Includes product maintenance. 

          Premium Signatures, Support and Maintenance is 23%

o          Includes NFR Security Rapid Response Team signature support.

o          Premium level customer support is available 24/7/365 with a twenty minute response time.

o          Includes a HW warranty of one year with advanced replacement, out years depot work, next
       day or bench repair.

o          Includes product maintenance.

Click here to return to vendor questionnaire index
Click here to return to the NFR Review
Click here to return to the IPS Index Section

Send mail to webmaster with questions or 
comments about this web site.

Copyright � 1991-2006 The NSS Group Ltd.
All rights reserved.