Sniffa Network Security Solutions

Open Network Detection and Response

Open NDR

Intrusion Detection Systems IDS and Clear Network Evidence for the Ultimate in Threat Visibility

Expose The Threats That Others Can't Find

Clear Network Evidence for Faster Investigations 

Correlating intrusion detection alerts with clear network evidence, will significantly reduce the time to detect attackers on your networks

Sniffa Network Security Solutions combine the alerts received from open-source Snort and Suricata™ intrusion detection systems (IDS) with the smart network traffic logs from open-source Zeekand full packet captures from Wireshark™, to produce comprehensive network traffic evidence that far surpasses that gathered by traditional network visibility tools and NetFlow collectors.


Our centralised sensor management applications present that network traffic evidence to SecOps staff in a way that makes threat hunting more efficient. There is no need to install complex and expensive SIEM solutions for your staff to learn and operate, when our all-in-one solution will do the job quicker, better and for a lot less cost.


Correlating alerts from your IDS with contextualised network traffic evidence, makes detecting and responding to cyber attacks far simpler and will allow your cyber security engineers to significantly reduce the time to detect attackers operating on your networks.

Reduce the time to detect attackers operating on your networks

Extensive Visibility straight out of the box

  • Alert on indicators of compromise (IOC)
  • Seek out malicious file downloads
  • Monitor web servers for injection attacks
  • Detect rogue DNS and DHCP servers
  • Fingerprint encrypted connections (JA3 & JA3S)
  • Correlate contextual network traffic evidence
  • Establish network traffic baselines
  • Identify the early stages of Ransomware attacks
  • Spot Malware C2 traffic leaving your networks
  • Identify lateral movement inside your networks
  • Discover bad or expired X509 certificates
  • Streamline IOC & Hypothesis based threat hunting
  • Alert on new or anomalous network behaviours
  • Pivot from IDS alert to Packet Capture (PCAP)

Solutions to match your Environment

SNIFFA

MULTI-CLOUD


Centrally Managed

Intrusion Detection &

Network Traffic Analysis

for the

Cloud Customer (IaaS)

Private, Public and Multi-Cloud Networks.

SNIFFA

WHITEBOX V-CPE


Centrally Managed

Intrusion Detection &

Network Traffic Analysis

for the

Service Provider

Virtual Customer Premises Equipment

SNIFFA

VIRTUAL DATACENTER


Centrally Managed

Intrusion Detection &

Network Traffic Analysis

for the

Service Provider

Virtual Datacenter and

SD-WAN

SNIFFA

ON PREMISES


Centrally Managed

Intrusion Detection &

Network Traffic Analysis

for the

Enterprise, SMB & SOHO

On Premises Networks and

Branch Offices

Get in touch and try our Software

You can download and install the Sniffa Sensor Manager Application Free for 7 days.


The Sensor Manager Application will install onto any currently supported Microsoft™ Windows Operating System and is used to centrally manage multiple open-source Zeek™, Snort™ and Suricata™ sensors deployed on your network.


A Trial Licence allows you to manage up to 2 Sensors in the cloud or on premises for  7 days.


Boost your Threat Hunting Effectiveness and expose the threats that others can't find.

Threat Hunting with Sniffa