Solera Networks™ and Sourcefire™ Announce Partnership
June 16th, 2010
“Active Network Forensics Integration Added to Leading IDS Solution
SALT LAKE CITY, UT – June 16, 2010 – Solera Networks, a leading network forensics products and services company today announced its partnership with Sourcefire, Inc. (Nasdaq:FIRE), the creators of SNORT® and a leader in intelligent Cybersecurity solutions. Solera Networks can now integrate its award-winning network forensics technology directly into Sourcefire’s event analysis. The integration enhances Sourcefire’s packet analysis functionality to include full session capture, which provides detailed forensics for any security event. The partnership enables swift incident response to any security event and provides full detail in the interest of understanding “what happened before and after a security event?”
“Sourcefire is a recognized leader in intrusion detection and prevention,” said Steve Shillingford, president and CEO of Solera Networks. “Many of today’s leading organizations rely on Sourcefire technology to protect their critical assets. Combining our high-speed active network forensics with their platform gives these companies another valuable tool in their arsenal to combat ever-changing and persistent attacks. With network forensics and instant replay they can quickly determine the complete source and scope of any security event. It’s like a DVR or surveillance for their network.”
Sourcefire IPS uses a powerful combination of vulnerability- and anomaly-based inspection methods to analyze network traffic and prevent threats from damaging the network. Solera Networks forensics appliances sit passively on the network and capture, index, record and replay all traffic, even on today’s fastest 10Gb networks. Sourcefire users can now have the option to see any slice of network traffic surrounding a security alert. These slices can be based on time, protocol, source/destination port and many other parameters. The Solera DeepSee Forensics Suite reconstructs and delivers a full record of anything crossing the network, including artifacts (files, emails, malware, etc.) contained in that traffic. The combined solution provides protection against known threats and the tools to prepare for, and swiftly respond to, the unknown threats.
“Threats are becoming more sophisticated and targeted,” said Martin Roesch, founder and CTO of Sourcefire. “There is a powerful advantage in being able to see the full content of every attack on your network. Network forensics from Solera Networks compliments Sourcefire’s IPS and RNA products by letting you see everything that led up to and followed a successful prevention of an attack. With an actual record of every network packet, customers can learn more about the behavior of the attacker and better prepare for future attack attempts.”
In addition to complete playback of traffic surrounding any security alert, the historical network record can be used to validate updated signature files. Solera DS appliances contain an exact replica of an organization’s network traffic, which allows analysts to replay old traffic to a recently updated Sourcefire IPS and validate the latest incremental protection delivered by Sourcefire’s Vulnerability Research Team (VRT).
Initial integration of the two products is delivered through free software now available from Solera Networks. To download a 30-day trial of the Solera DS Virtual Appliance or to schedule a demo, please visit www.soleranetworks.com or contact Solera Networks at 877-5SOLERA (877 576-5372) or (801) 545-4100.”