HOW FIREDOT THREAT SENSOR WORKS
Firedot ™ detects suspicious activity in network environments, quickly identifying threats to your assets so that you can respond. We monitor network traffic and analyze billions of events with our ActiveAnalytics.
• Provides comprehensive protection with an extensive IDS signature database, continual updates, and unlimited vulnerability scanning
• Delivers emerging threat protection based on insight gained from thousands of global customers
• Reduces costs compared against the costs of using multiple traditional solutions
• Provides the latest security technology managed by Firedot – certified analysts
• Significantly reduce costs by augmenting in-house security team with Alert Logic Firedot experts – freeing
up internal resources to focus on other tasks.
Using intelligent multifactor correlation, we identify security events requiring attention. After validation by a Security analyst, we notify you with recommended actions/responses within 15 minutes for critical issues. When needed, senior specialist teams are engaged to assist you. You can also implement automated blocking through integration with your network firewalls.
We give you insight into the real threats in your environments, helping you make more informed security investment and resource decisions. When the security program is driven by a clear understanding of the real threats affecting your network, your efforts and investments will provide more benefit and significantly enhance your security posture.
EXPERT ONBOARDING AND OPERATIONALIZATION
Security investments often go unused or are deployed with partial or default settings – placing businesses at risk while never fully realizing their investments. Our security professionals ensure proper deployment, configuration, tuning and optimization of Firedot® Threat Manager™.
Every customer is assigned an Firedot onboarding project manager (OPM) to manage the entire process and onboarding team of 20+ specialist including: Project Managers, Onboarding Engineers, NOC Technicians, Network & System Administrators, Security Analysts and Product Trainers.
THE RIGHT SECURITY APPROACH MEANS BETTER SECURITY OUTCOMES
The Firedot® approach is fundamentally different from traditional security vendors, who sell single purpose security technologies that require their customers to staff, train, implement and monitor which constantly increases costs and seldom fully addresses the full scope of your security issues.
With Alert Logic, you pay for specific security capabilities and our expertise in delivering them, and you don’t make a capital investment to achieve your security goals.
In the age of fast-changing threats and distributed infrastructure, Security-as-a-Service gives you the outcomes you need.
You get all these benefits without a large investment, staff burden or distractions from your strategic IT initiatives. Security-as-a-Service delivery provides you Threat Manager™ with Firedot™ for a fixed monthly fee, including all monitoring, software and our 24×7 Security Operations Center (SOC) to validate incidents and provide support. You access your Threat Manager™ data through a web interface – the very same one used by our analysts.
Firedot Network Sensor DEPLOYMENT
In the protected environment, Firedot™ passively collects network traffic data and transports it to Firedot Cyber Center through encrypted channels using:
• Physical or Virtual Appliances
• Agents with virtual tap
Events are analyzed by Firedot ActiveAnalytics.
Intelligent multifactor correlation identifies suspicious patterns of events, and creates actionable incidents.
Until today, honeypots were developed and used primarily by researchers and security enthusiasts. Honeypot technology, like most security technologies, can be time consuming to install and configure.
“Security event management solves today’s critical problem of aggregating and correlating
diverse log data for real-time event detection and response. In the future I see
these security management platforms serving as the central intelligence systems
for security operations.”- Richard Stiennon of the Gartner Group,