<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

New in SELKS 6

  • The latest edition of Suricata IDS/IPS platform
  • Updated Scirius Community Edition - with additional capabilities in Scirius Threat Hunting
  • Updated ELK 7 stack 
  • Debian Buster OS
  • 26 new and improved Kibana dashboards
  • The latest edition of Moloch

Not sure SELKS is enough for your Organization? See the table below for a comparison between SELKS and the Stamus Networks commercial offerings.

Feature (partial list) SELKS Scirius Probe Management Scirius Enriched Hunting Scirius Threat Radar
IDS administration for one probe X X X X
IDS ruleset management for one ruleset X X X X
Basic threat hunting on IDS events X X X
Real-time network traffic analysis X X X X
IDS administration for multiple probes X X X
IDS ruleset management for multiple rulesets X X X
Multiple Stamus Networks Probes and/or Suricata Sensors X X X
Automated health and wellness monitoring X X X
Automated application and OS updates X X X
Unified network Threat Hunting tool X X
Guided hunting that drives detection X X
Real-time correlation of IDS events, network traffic analysis and organizational data X X
Automated event classification and advanced tagging X X
Network definitions providing enhanced detection of lateral threat proliferation X X
Enriched data provides context and increase network visibility X X
Unique metadata for perspective and investigation X X
Metadata integration with SIEM, SOAR, and data lakes X X
Highest probability indicators mapped into the cyber kill chain X
Unified threat detection results drive insightful threat detection algorithms from Stamus Networks X
User defined algorithms detect high probability threats specific to your environment X
Host fingerprinting details network services, user agents, host name and logged in users X
Prioritizes high probability events to direct investigations X
Proofpoint ETPro Ruleset bundle X