Managed Service Details

CLEARNETWORK uses state of the art hardware and software to monitor activity on your network. Our prevention system, usually deployed at the gateways, can stop attacks as they happen. Our network sensor watches the remaining traffic, keeping a watchful eye on all activity that traverses your network links. When allowed traffic makes its way to your servers and applications, log files are created. Our log sensor is a state of the art, near real time, log filtering engine. It will monitor your systems looking for real events and take action when needed.

  • Enforcement of corporate Internet policy, as all employee usage is monitored.
  • Malware, Trojans and other threats are quickly detected and alerted.
    • CLEARNETWORK maintains a list of known 'command and control' servers on the internet and detects connection attempts to those servers from systems inside the client environment.
    • Heuristic Analysis and Detection
    • Statistical Analysis and Detection
    • A comprehensive ruleset with regularly prescribed CVE updates, and the most extensive malware coverage in the industry.
    • Update of signature files to all Sensors as required/appropriate, and/or as they become available.
    • Low false positive rating through the use of state-of-the-art Sandnet and feedback loop.
    • Unauthorized release of predefined data is quickly detected and alerted.
  • Configurable
    • Construction and deployment of custom signatures as necessary and appropriate based on your requirements.
    • Per device alert tuning
    • Easy installation, all Sensors come pre-configured.
  • Advanced Alert Handling
    • Immediate electronic alerting on high-severity and high-confidence events.
    • Ticketed workflow and ticket integration via SMTP.
    • Data is reviewed and analyzed daily as captured in alert logs and compared to known attack patterns and schemes for each of the Sensors located at customer premises.
    • Human analysis of all alerts generated by Sensors.
    • Customized reports tailored to client requirements.
    • Technical Reports in regards to events and incidents.
    • Incident tracking from start to finish via our advanced ticketing system with a detailed monthly report detailing all conversations between our engineers and your support staff.
  • Safely Enable Applications
    • Identify more than 2000 applications, regardless of port, protocol, encryption, or evasive tactic
    • Fine-grained control over applications/application functions (allow, deny, limit, scan, shape)
    • Systematic management of unknown applications
    • Identify and control users regardless of IP address, location, or device
  • Prevent Threats
    • Stop a variety of known threats – exploits (by vulnerability), viruses, spyware
    • Detect and stop unknown threats with advanced attachment analysis in the cloud
    • Stop leaks of confidential data (e.g., credit card #, social security #, file/type)
    • Enforce acceptable use policies on users for general web site browsing