SOURCE: Solera Networks

Solera Networks

January 18, 2011 08:03 ET

Solera Networks™ Announces Solera DeepSee™ App for Splunk

Free Download Improves Security With Single Click Full Reconstruction of Any Network Event

WASHINGTON, DC--(Marketwire - January 18, 2011) - Black Hat -- Solera Networks, a leading network forensics products company, today announced that it has released the new Solera DeepSee™ App for Splunk. This integration delivers full context to any security alert managed through the Splunk platform, enabling in-depth root cause analysis and comprehensive investigations to combat today's complex threats. The free download adds a powerful "investigate" button to quickly pivot users from any event to a Solera DS Appliance.

Splunk is recognized for its ability to manage event data from almost any network security device, including firewalls, intrusion detection/prevention (IDS/IPS) systems, servers, web gateways, and a multitude of other network and security devices. With Splunk, system administrators and security professionals can easily navigate and search through log files, alerts, and other "meta data" describing the network event. The integration with Solera DeepSee allows these professionals to start from a high-level description in Splunk and drill down to a full-fidelity transcript and reconstruction of the network at the time of the event.

Like a surveillance camera for the network, Solera DS Appliances classify, store, and recreate every bit of network data that crosses the network, even on today's ultra fast networks, physical or virtual. These award-winning appliances provide value in three key areas:

  • They provide full visibility and situational awareness into any individual or system's network activity.

  • Incident investigations are more effective through root cause analysis of any network security event, detailing where the hole in the network exists and painting a vivid picture of the full scope of what was lost.

  • They promote deterrence and prevention by discovering and eliminating persistent threats before they become catastrophic to the organization, as well as encouraging users to be smart about use of network resources.

"This integration with Splunk is a major move forward in our ability to combat and blunt the effects of the types of threats we are seeing today," said Steve Shillingford, President and CEO of Solera Networks. "Splunk collects all the event data from the network and the integration allows you to then pivot from that data to the actual network traffic that is recorded, indexed and classified on Solera DS Appliances. From there you then investigate the events with the depth and clarity provided by Solera DeepSee. The root cause and scope of the event is identified, actual evidence and artifacts are uncovered, and time to remediation is drastically reduced."

The new Solera DeepSee App for Splunk is available on Splunkbase for download and works with any of the Solera DS Appliances, including the Solera DS Virtual Appliance. The Virtual Appliance is available as a 30-day free trial at: www.soleranetworks.com

About Solera Networks

Solera Networks develops a high-speed network surveillance and forensics platform for complete capture, indexing, search, retrieval, and reconstruction of any network event. Our systems capture every packet at line rates up to 10Gbps on physical and virtual networks. The Solera Networks architecture provides open platform interoperability, extensible storage, and portability for any network, giving security professionals comprehensive network visibility. For more information on Solera Networks, visit www.soleranetworks.com.

Contact Information