An advanced network detection and response solution that exposes threats to your critical assets, empowers your rapid response, and mitigates your organization's risk.
Scirius Security Platform captures event data from enhanced Suricata detection (IDS), real-time network traffic analysis (NTA), and organizational context which is processed by an advanced analytics engine to create an entirely new class of network detection and response (NDS) solution. With Scirius, you get unprecedented visibility and meaningful insights into your organization’s security posture, giving you the tools to rapidly detect and respond to incidents and mitigate your risk.
Our platform identifies threats, automates tasks, and contextualizes IOCs - reducing your risk, improving your efficiency, and increasing the overall effectiveness of your cybersecurity team.
Scirius Probe Management lowers your cost to manage network sensors via an easy-to-use web interface, provides excellent visibility to events and threats, and delivers traditional Suricata IDS events ready to be forwarded to your SIEM or data lake.
Scirius Threat Radar completely shifts the network threat hunting process from a traditional alert-driven model to an asset-centric approach, allowing the analyst to more clearly understand the threat impact and accelerate incident response.
Feature (partial list) | Scirius Probe Management | Scirius Enriched Hunting | Scirius Threat Radar |
---|---|---|---|
IDS administration | X | X | X |
IDS ruleset management | X | X | X |
Real-time network traffic analysis | X | X | X |
Multiple Stamus Networks Probes and/or Suricata Sensors | X | X | X |
Automated health and wellness monitoring | X | X | X |
Automated application and OS updates | X | X | X |
Extensive RESTful API for integration into your security ecosystem | X | X | X |
Unified network threat hunting tool | X | X | |
Guided hunting that drives detection | X | X | |
Real-time correlation of IDS events, network traffic analysis and organizational data | X | X | |
Automated event classification and advanced tagging | X | X | |
Network definitions providing enhanced detection of lateral threat proliferation | X | X | |
Enriched data provides context and increase network visibility | X | X | |
Unique metadata for perspective and investigation | X | X | |
Metadata integration with SIEM, SOAR, and data lakes | X | X | |
Highest probability indicators mapped into the cyber kill chain | X | ||
Unified threat detection results drive insightful threat detection algorithms from Stamus Networks | X | ||
User defined algorithms detect high probability threats specific to your environment | X | ||
Host fingerprinting details network services, user agents, host name and logged in users | X | ||
Prioritizes high probability events to direct investigations | X | ||
Proofpoint ETPro Ruleset bundle | X |
ABOUT STAMUS NETWORKS
Stamus Networks believes cybersecurity professionals should spend less time pouring through noisy alerts and more time mitigating risks by responding to real threats targeting their organization’s critical assets. Founded by the creators of the widely-deployed open-source SELKS platform, Stamus Networks offers Scirius Security Platform that collects event data from enhanced Suricata detection (IDS), real-time network traffic analysis (NTA) and organizational context into an advanced analytics engine to deliver a powerful network detection and response (NDR) solution.
© 2020 Stamus Networks, LLC. All rights Reserved.