Sniffa Network Security Solutions combine the alerts received from open-source Snort and Suricata intrusion detection systems (IDS) with the high-fidelity network transaction logs from open-source Zeek and full packet captures from Wireshark, to produce comprehensive network traffic evidence that far surpasses that gathered by traditional network visibility tools and NetFlow collectors.
Our centralised sensor management applications present that network traffic evidence to your SOC Analysts in a way that makes threat hunting more efficient, as well as integrating with SIEM applications such as Splunk for rapid pivoting and log correlation.
Correlating alerts from your IDS with contextualised network traffic evidence, makes detecting and responding to cyber attacks far simpler and will allow your cyber security engineers to significantly reduce the time to detect attackers operating on your networks.
Centrally Managed
Intrusion Detection &
Network Traffic Analysis
for the
Cloud Customer (IaaS)
Private, Public and Multi-Cloud Networks.
Centrally Managed
Intrusion Detection &
Network Traffic Analysis
for the
Service Provider
Virtual Customer Premises Equipment
Centrally Managed
Intrusion Detection &
Network Traffic Analysis
for the
Service Provider
Virtual Datacenter and
SD-WAN
Centrally Managed
Intrusion Detection &
Network Traffic Analysis
for the
Enterprise, SMB & SOHO
On Premises Networks and
Branch Offices
You can download and install the Sniffa Sensor Manager Application Free for 7 days.
The Sensor Manager Application will install onto any currently supported Microsoft Windows Operating System and is used to centrally manage multiple open-source Zeek, Snort and Suricata sensors deployed on your network.
A Trial Licence allows you to manage up to 2 Sensors in the cloud or on premises for 7 days.
Boost your Threat Hunting Effectiveness and expose the threats that others can't find.