Fidelis XPS Collector network appliance released
Posted on 27 September 2012.
Fidelis Security Systems announced Fidelis XPS Collector, a new network appliance that enables the storage, query and correlation of all sessions on a network.

The appliance helps security teams evaluate all session metadata, regardless of whether or not it was previously identified as malicious. This provides analysts with deep, continuous and historical visibility on all traffic at key monitoring points, allowing them to quickly and more accurately identify anomalous patterns to detect new attacks designed to evade traditional security tools.

In addition, analysts can use common attack indicators to understand the full scope of an incident, helping to better protect their organizations against advanced persistent threats.

Working in conjunction with Fidelis XPS sensors and Fidelis XPS CommandPost, the Fidelis XPS Collector provides a simple architecture that is not storage-intensive. The tools combined capabilities give security teams the ability to detect malicious sessions designed to evade security tools that rely on previous knowledge of the threat or its behavior for identification.

This added insight allows analysts to identify and assess if past incidents might be part of the same campaign, even if those incidents had not been originally flagged due to the lack of a corresponding rule. Armed with this information, they can create tuned rules to prevent future attacks that are part of the ongoing campaign.

Fidelis XPS Collector features further enhance the Fidelis XPS network security product family use cases:

Advanced threat defense allows for enhanced defense by providing the ability to quickly correlate sessions that may have triggered a policy-driven rule and by quickly identifying other systems that may have been breached as part of the same attack.

Intelligent network forensics improves forensic capabilities by the access to session metadata and its powerful query capabilities.

Data breach prevention enhances the ability to look for files that may have been exfiltrated.

Cloud services security stores information about all applications, which allows for the detection of unauthorized use of cloud-based services.


What's the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Thu, Feb 11th