Direct integration into the Sourcefire Defense Center gives you contextual detail to any alert delivered by this popular IPS and Real-time Adaptive Security solution. With access to the full network payload, you can determine what happened before, during, and after any Sourcefire alert.
Over 2,600 licensed enterprises, cloud providers, and government agencies from 78 countries use Splunk. With the DeepSee App for Splunk, you connect events found in Splunk to the full network payload of the event captured on Solera DS Appliances.
Malware poses a huge threat to any network. FireEye is a recognized leader in malware protection systems and with Solera Networks integration built into the FireEye UI, you can recreate the complete picture of how the malware entered, where it went, and where it remains on the network.
When monitoring your network security using ArcSight Enterprise Security Manager (ESM), it is often necessary to know more than what can be found in aggregated log data. With a direct integration into Arcsight ESM, Solera Networks customers can know exactly what happened before, during, and after an event and mitigate further risk.
Partner Brief | HP ArcSight Integration Video
AlienVault is the creator of OSSIM, the de facto standard Open Source SIEM with over 160,000 downloads and users in 80 countries. AlienVault includes tools like nmap, Snort, OSSEC, openVAS, NFDump, Nagios and more – to automatically discover assets, assess vulnerabilities, detect intrusions and monitor systems.
LogRhythm is an enterprise-class security platform that seamlessly combines log and event management, file integrity monitoring and host activity monitoring—delivering advanced cyber threat defense, detection and response within a fully integrated SIEM 2.0 solution.
SonicWALL provides end-to-end security solutions including firewalls, SSL VPNs, email security, and continuous data protection. Any SonicWALL-generated alert can take advantage of full packet capture, indexing, high-fidelity search, replay, and reporting capabilities from Security Analytics Appliances.
Solera Networks integration with McAfee Network Security Platform (NSM) and Enterprise Security Manager (ESM – Formerly Nitro) offers an efficient workflow for network event investigation and analysis. By leveraging Solera Networks APIs, security analysts or incident responders have content “look-back” capabilities for a full view of historical network events, enabling forensically complete incident investigation.
McAfee NSM Integration Brief
McAfee ESM Integration Brief
DeepSee Integration Video
Network threats, malware, and cyber attacks often disguise themselves using encrypted traffic. Netronome decrypts all SSL-encrypted network traffic and passes it to Security Analytics Appliances for capture, classification, reporting, and retrieval. With Netronome and Solera Networks you can investigate events that would otherwise be unseen.
When managing logs, security events, and vulnerability data in QRadar®, Q1 Labs’ Security Intelligence Platform, integrated with Security Analytics Appliances, gives you full packet-level detail of any event for quick discovery of the source and scope of an event.
Palo Alto Networks is the leader in next-generation firewalls. When threats are successfully stopped, you can dig deeper and uncover other activity by attackers and determine if they successfully breached the network through other attack vectors.