Products

redborder Live: Cybersecurity as a Cloudservice. Try our Free plan. Check out our options and features included.

We protect against MalwareDenial of Service (DoS, DDoS)Man in the MiddleRogue AP, botnets...PhishingPort SpanningCorporative Potential Policy ViolationInformation Leak & sensitive data transferZero-day exploitVulnerability exploits malicious code

redborder Manager

The Manager appliances are high performance and powerfull devices designed to run redborder platform. This is the main hardware unit of our development in charge of analyzing all the information that flows through the different modules that make up the platform. Manager units are fully scalable in order to adapt to any network infrastructure.

The events generated by thousands of flowgate probes will reach a central point where they are collected, enriched, and stored by a real-time pipeline with scale-out capacity. Implement correlation rules with the other modules (Intrusion,Traffic, System Event & Security Informatión, Mobility, etc..) and get the full control of your network.
Manager offers data enrichment with external intelligence sources combined with data mining, correlation and behavioral analytics. Gain practical insights from integrated data. The service process contain extremely powerful Artificial Intelligence, it is designed to learn directly from the network administrators and security professionals when determining what “normal” behaviour is and what it is not.
We employ an Open Source core business model for high-speed innovation, collective intelligence, freedom, and cost control. We believe in the power of the community and are betting on a purely Open Source future.
The Platform can process millions of events per second from networks of any size in real time. Scale-Out power for managing probes, network devices, analysis activity and users in a multitenant and cloud-ready infrastructure.

Included modules

Security info & event management

Manage all your logs, including third party vendors SIEM

Wireless trafic analisys

Integrate AP Wifi for indoor localization and data analisys

Hardware monitoring

Monitoring deployment hardware trough SNMP

Correlation engine

Analysis combining any rule, detect anomalies and behaviours

Avaliability

Also Available On-premise, Virtual Platform or On Cloud solutions.

Technical sheet

YOUR PROBE, YOUR CHOICE.

The Intrusion probes are kind of devices which examine all packets going to your network and sending those information to the IPS platform. Deploy thousands of probes through your network and configure them to look after the specific information you are looking for.

THE MANAGEMENT PLATFORM.

The events generated by thousands of IPS/ IDS probes will reach a central point where they are collected, enriched, and stored by a real-time pipeline with scale-out capacity. Implement correlation rules with the other apps (Traffic, SIEM, Mobility, Monitor) and get the full control of your network.

CONTEXTUALIZATION.

Data is enriched with context without alteration based on existing data fields. This improves the decision-making and understanding processes. Additional data can come from external sources such as geolocation or reputation feeds, but also from other Apps active in the platform.

redborder Intrusion probe

Redborder appliances are high performance IPS/IDS probes designed to bring a simply,
scalable and flexible way to protect your network.

Combined with our redborder Manager, our unified security platform, we provide the most
flexible and powerful way in the market to deploy and manage an Intrusion detection and
prevention system.
Intrusion probes are flexible and compatible with multiple rule/signature feeds, user can configure the most suitable set of security rules using our domain, user and hierarchy system.
Our software enhancements over a standard Snort probe make our Intrusion probes the
fastest, implementing PF-Ring based forwarding and Internal Traffic balancing.
Intrusion probes can be adapted to any kind of network scenario, letting you easily define and
modify the network inspection segments and the operation modes (IPS, IPS Test, IDS Forwarding,
SPAN).

Included modules

Active Cibersecurity

Protect your IT network with our Next Generation IPS (NGIPS) deployment.

Correlation engine

Analisys combining any rule, detect anomalies and behaviours

Avaliability

Also Available On-premise, Virtual Platform or On Cloud solutions.

Technical sheet

POLICY CONTROL.

Managing Snort and Suricata events is not new to open source. What makes redborder NNext Generation IPS unique is the combination of scale and enterprise quality policy management in the same open source platform. This would make redborder stand on its own, but combined with the other applications the only limit is your imagination.

HIERARCHICAL POLICIES.

Devices are configured in a hierarchical structure that allows you to manage them as groups, with configuration and policies enforced downstream while maintaining local independence. This applies to all levels, including the probe itself, its segments, and the different networks.

POLICY WORKFLOW.

Policy management is a complex task. Create policy profiles with ease and apply them hierarchically to your devices. Rules can be searched, ordered, or categorized for simplicity. Any change can be recovered and is trackable. All deployments are controlled by you..

redborder Flowgate probe

Flowgate appliances are high performance devices designed to significantly improve
network security by monitoring network traffic and exporting flow information that can be
collected and analysed inside the redborder platform or other compatible collectors.

Redborder flowgate probes are designed to offer
a dedicated high-performance device to collect information about traffic without overloading
existing network resources and offering additional features to those provided by other
built-in flow exporters of usual network devices.
Connect the flowgate to the redborder platform and get the maximum visibility of your infraestructure. On the other side Flowgate probes are flexible units and could be connected in your local network or in an external networks to get that traffic information.
Thanks to a network traffic monitoring software you can detect changes in the behaviour of your network and thus identify anomalies indicating a security breach. Data is also a useful tool in regulatory computing, for understanding and reviewing the history of security incidents so that you can learn the appropriate lessons and make the necessary changes in the future.
Supported Protocols:

– Netflow v5, v9 and IPFIX, sFlow, jFlow.
– 100% packet capture and /or sampled flow.
– Flexible options design (1GB to 10GB ports).
– Customized templates for traffic information.
– Deep Package Inspection (DPI) feature.
– Snmp and syslog monitoring compatibility.

Included modules

Network Traffic Analysis

Complete data visualization, NetFlow, sFlow, DPI analisys, geolocation and more.

Correlation engine

Analisys combining any rule, detect anomalies and behaviours

Avaliability

Also Available On-premise, Virtual Platform or On Cloud solutions.

Technical sheet
VISUALIZE

Discover at a glance the bandwidth traffic, the devices in use, their mobility, the applications running, any unusual activity and a lots of more information about your

MANAGE

Create and customize dashboards, rules, alerts, probes, reports and a lots of more tools to get a real time full monitoring of your network into a single platform.

PROTECT

Get a full network protection thanks to the the data correlation between redborder IPS, FLOW, SIEM, and WIFI and strengthen the security of your network.

TIME MACHINE

All data are recorder in platform core, use them for do forensic analisys. We can easily access the past and see what the state of our infrastructure network was like and reproduce it as if it were in real time.

redborder App

Possibility of monitoring from anywhere
Rapid deployment
Realtime notifications
Compatibility with different devices

Your app.
Just for you.

What interests you. At a glance.

Don’t worry. We let you know.

Take control.
Respond.