Story image

Endace onboards network security firm Idappcom as new tech partner

17 Jan 2018

New Zealand-born network analytics provider Endace and global network security services provider Idappcom have partnered to fuse threat management capabilities across the Endace platform.

Endace and Idappcom have both signed the Endace Fusion technology partner agreement. As part of the agreement, Idappcom has developed a SNORT-based, scalable threat management solution that is both hosted and integrated with EndaceProbe Network Analytics Platform.

According to Endace’s VP of product management Cary Wright, the company is pleased to have Idappcom on board.

“Fusion Partners are a select group of best-of-breed vendors that have integrated their solutions with the EndaceProbe platform. Its long history in threat analysis, signature creation and rules production makes Idappcom a very insightful security partner. Idappcom’s Distributed Rules Management software provides simple, scalable management of SNORT instances hosted on estates of hundreds of EndaceProbes,” Wright says.

Organisations will be able to deploy Idappcom’s managed Intrusion Detection System in any location an EndaceProbe is deployed. They will also be able to manage rules and policies through Idappcom’s Distributed Rules Manager (DRM). The DRM can import rules from Idappcom’s library and any third-party rule providers.

Idappcom CSO Simon Wessledine notes, “The need to detect, record and rapidly triage security threats in all the far reaches of the network has become critical given the increasing frequency of breaches and new strict reporting requirements. This joint solution solves that need with a very open and scalable architecture. We are very excited to make our security solution available to all EndaceProbe customers.”

The company says the technology aims to be a multi-source, multi-user and multi-sensor security platform.

“When a security threat is detected by a managed SNORT instance, the alert can be viewed centrally in the DRM log. A tightly integrated workflow lets security analysts click the alert to view the related packet history in EndaceVision and EndacePackets, the EndaceProbe’s built-in investigation tools, giving them access to definitive evidence of what’s taken place,” the company says.

It also says Idappcom’s DRM is able to manage the latest version of SNORT IDS specially packaged to run in the EndaceProbe’s high performance Application Dock hosting environment. Any EndaceProbe in the network can host Idappcom-managed SNORT instances to detect security threats in real time while simultaneously recording 100% of network traffic to disk.

“The EndaceProbe’s Playback feature allows new, unique historical analytics capability. For example, analysts can scan for zero day attacks when a new rule is released by playing back recorded network history to a hosted instance of an IDS, such as SNORT, with the new rule enabled. They can quickly determine if any zero day attacks were executed against their organisation prior to the new rule being available.”

Endace started as a university research project in New Zealand and has grown to become a global company that services large clients. Technology partners include Arista Networks, Finisair, Huntsman Security and Trimble.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.