Powerful threat prediction, prevention, detection, and response along with compliance in a scalable, simple managed solution.
Whether you have 10 locations or 10,000+, Acumera’s combination of edge computing, networking, security, and 24x7 support gives you the flexibility to manage and scale your distributed networks while unlocking unlimited possibilities for innovation. As network security leaders and edge originators, Acumera combines the immediacy of localized computing with the power of the cloud, enabling real-time computation to deliver value to your business. Read More
Accelerate business growth through our award-winning partner program.
Applies To: Snort 2.9 and later.
Snort IDS is an open-source intrusion detection system that analyze network traffics in real-time and provides data packet logging. It detects potentially malicious activities by employing a rule-based language that integrates anomaly, protocol, and signature inspection methods.
Netsurion monitors Snort events retrieved via syslog. Dashboard, category, alerts, and reports in Netsurion's threat protection platform, EventTracker, will benefit you in tracking possible attacks, suspicious activities, or any other threat based on rules defined in the Snort configuration file.
Netsurion Knowledge Pack for Snort IDS allows you to monitor the following components:
Once Snort IDS auditing is enabled and Snort IDS logs are received in EventTracker, configure alerts and reports.
The configuration details are consistent with EventTracker version 9.3 or later, and Snort 2.9 or later.
To configure the Snort IDS to send logs to EventTracker, refer to the How-to Guide.
To configure the Knowledge Pack in the EventTracker console, refer to the Integration Guide.