Scirius Security Platform captures event data from enhanced Suricata detection (IDS), real-time network traffic analysis (NTA), and organizational context into an advanced analytics engine to create an entirely new class of enriched threat hunting solution. With Scirius, you get unprecedented visibility and meaningful insights into your organization’s security posture, giving you the tools to rapidly detect and respond to incidents and mitigate your risk.
Our platform identifies threats, automates tasks, and contextualizes IOCs - reducing your risk, improving your efficiency, and increasing the overall effectiveness of your cybersecurity team.
Scirius Probe Management lowers your cost to manage network sensors via an easy-to-use web interface, provides excellent visibility to events and threats, and delivers traditional Suricata IDS events ready to be forwarded to your SIEM or data lake.
Scirius Threat Radar completely shifts the network threat hunting process from a traditional alert-driven model to an asset-centric approach, allowing the analyst to more clearly understand the threat impact and accelerate incident response.
|Feature (partial list)||Scirius Probe Management||Scirius Enriched Hunting||Scirius Threat Radar|
|IDS ruleset management||X||X||X|
|Real-time network traffic analysis||X||X||X|
|Multiple Stamus Networks Probes and/or Suricata Sensors||X||X||X|
|Automated health and wellness monitoring||X||X||X|
|Automated application and OS updates||X||X||X|
|Extensive RESTful API for integration into your security ecosystem||X||X||X|
|Unified network threat hunting tool||X||X|
|Guided hunting that drives detection||X||X|
|Real-time correlation of IDS events, network traffic analysis and organizational data||X||X|
|Automated event classification and advanced tagging||X||X|
|Network definitions providing enhanced detection of lateral threat proliferation||X||X|
|Enriched data provides context and increase network visibility||X||X|
|Unique metadata for perspective and investigation||X||X|
|Metadata integration with SIEM, SOAR, and data lakes||X||X|
|Highest probability indicators mapped into the cyber kill chain||X|
|Unified threat detection results drive insightful threat detection algorithms from Stamus Networks||X|
|User defined algorithms detect high probability threats specific to your environment||X|
|Host fingerprinting details network services, user agents, host name and logged in users||X|
|Prioritizes high probability events to direct investigations||X|
|Proofpoint ETPro Ruleset bundle||X|