<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

A New Perspective On Network Threat Detection and Response

Scirius Security Platform captures event data from enhanced Suricata detection (IDS), real-time network traffic analysis (NTA), and organizational context into an advanced analytics engine to create an entirely new class of enriched threat hunting solution. With Scirius, you get unprecedented visibility and meaningful insights into your organization’s security posture, giving you the tools to rapidly detect and respond to incidents and mitigate your risk.

REQUEST A DEMO
Stamus-Transparent-Triangle
DATASHEET

Our platform identifies threats, automates tasks, and contextualizes IOCs - reducing your risk, improving your efficiency, and increasing the overall effectiveness of your cybersecurity team.

Stamus_SPM_icon-1

scirius probe management

Enterprise Scale management of multi-probe deployments

Scirius Probe Management lowers your cost to manage network sensors via an easy-to-use web interface, provides excellent visibility to events and threats, and delivers traditional Suricata IDS events ready to be forwarded to your SIEM or data lake.

Read more >>

  • IDS Administration
  • IDS Ruleset Management
  • Multiple Stamus Networks Probes and/or Suricata Sensors
  • Automated health and wellness monitoring
  • Automated application and OS updates
  • Extensive RESTful API supports integration into your security ecosystem
Stamus_SEH_icon-1

scirius enriched hunting

Quickly detect, investigate, and respond to threats

Scirius Enriched Hunting allows analysts to quickly detect, investigate, and respond to threats with powerful data aggregation, correlation and investigation from IDS events, NTA and organizational data

Scirius Probe Management features, PLUS

  • Real-time data aggregation and correlation of IDS events, network traffic and organizational data
  • Guided hunting and advanced filter views drive rapid detection
  • Automated event classification through tagging workflow
  • Custom network definitions provide enhanced detection of lateral threat proliferation
  • Enriched data provides context and increase network visibility
  • Metadata integration with SIEM, SOAR, and data lakes
Stamus_STR_icon-1

scirius threat radar

Gain high-level insight into your organization's security posture

Scirius Threat Radar completely shifts the network threat hunting process from a traditional alert-driven model to an asset-centric approach, allowing the analyst to more clearly understand the threat impact and accelerate incident response.

Read more >>

Scirius Enriched Hunting features, PLUS

  • Advanced threat detection
  • Host- and user-centric approach to incident investigation
  • Asset-oriented attack insights 
  • Custom threat definitions
  • Subscription to Proofpoint ETPro Ruleset included
Feature (partial list) Scirius Probe Management Scirius Enriched Hunting Scirius Threat Radar
IDS administration X X X
IDS ruleset management X X X
Real-time network traffic analysis X X X
Multiple Stamus Networks Probes and/or Suricata Sensors X X X
Automated health and wellness monitoring X X X
Automated application and OS updates X X X
Extensive RESTful API for integration into your security ecosystem X X X
Unified network threat hunting tool X X
Guided hunting that drives detection X X
Real-time correlation of IDS events, network traffic analysis and organizational data X X
Automated event classification and advanced tagging X X
Network definitions providing enhanced detection of lateral threat proliferation X X
Enriched data provides context and increase network visibility X X
Unique metadata for perspective and investigation X X
Metadata integration with SIEM, SOAR, and data lakes X X
Highest probability indicators mapped into the cyber kill chain X
Unified threat detection results drive insightful threat detection algorithms from Stamus Networks X
User defined algorithms detect high probability threats specific to your environment X
Host fingerprinting details network services, user agents, host name and logged in users X
Prioritizes high probability events to direct investigations X
Proofpoint ETPro Ruleset bundle X