Intrusion Detection con Snort, leader per la Gartner
Snort, sistema open source di network intrusion prevention sviluppato salla Sourcefire, è il più utilizzato sistema IDS/IPS a livello internazionale.
Nel Magic Quadrant Network Intrusion Prevention System della Gartner, Sourcefire si posiziona tra i leaders in base all’abilità di esecuzione e completezza di visione.
I principali punti di forza di Sourcefire, elencati dalla Gartner, sono risultati essere:
Real time Network awareness e real time user awareness
Utilizzo di Snort come motore di intrusion detection
Visibilità di ciò che sta all’interno dei rules (workflow customizzabili, supporto tecnico avanzato)
Elevata flessibilità e scalabilità
Anche in NetEye abbiamo integrato già da tempo Snort come network detection system e nell’arco del prossimo anno prevediamo di migliorare e potenziare ulteriormente il modulo di Security management per rispondere alla crescente richiesta di sicurezza da parte dei nostri clienti.
A safer way to run privileged Windows checks with SystemRunner If you’ve been monitoring Windows for a while, you’ve probably seen this pattern: some checks must run as LocalSystem (S-1-5-18), and the “quick fix” is to run the Icinga Agent Read More
With the upgrade to NetEye 4.44, we've added a lot of new features (https://www.neteye-blog.com/2025/10/neteye-4-44-release-notes/) and, from my point of view, one of the most relevant is the introduction of Elastic Stack 9. This Elasticsearch major release (https://www.elastic.co/guide/en/elastic-stack/9.0/elastic-stack-release-notes.html) includes some new Read More
In NetEye, 'business processes' is a module used to model and monitor the business process hierarchy to obtain a high-level view of the status of critical applications. In short, they allow monitoring controls of individual components to be aggregated into Read More
If you've worked with Elastic APM, you're probably familiar with the APM Server: a component that collects telemetry data from APM Agents deployed across your infrastructure. But what happens when you need to segregate that data by tenant, especially in Read More
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More