Intrusion Detection and Prevention in UserGate Solutions
UserGate employs an intrusion detection system of its own design, developed in-house without the use of open source, as part of its next-generation firewall.
All applied IDPS signatures are developed and verified by the UserGate Monitoring and Response Center (MRC-UG) in-house team of analysts. To date, the center's analysts have developed more than 6,000 signatures, and their number is increasing every day. When developing rules, information from various computer incident response centers is also used.
Working with Mirror Traffic from SPAN Port on the Switch
UserGate can be used in both monitoring and blocking modes (IPS and IDS). UserGate provides network protection by detecting signs of attacks in incoming and outgoing traffic that use certain known vulnerabilities or perform malicious activity. For example, signs of botnet protocols, virus signatures, etc., as well as user actions that are contrary to the company's corporate policy (for example, the use of torrents) are recognized. Heuristic algorithms allow you to identify new or modified methods of attacks, increasing the level of security.
Working with Transit Traffic in L3 or L2/L3 Bridge Modes
About the UserGate Monitoring and Response Center (MRC-UG)
The UserGate Monitoring and Response Center is a team of information security specialists who research network threats. Employees of the center regularly monitor the emergence of new threats and analyze the methods of penetration of intruders into corporate networks. On the one hand, the team uses information from numerous open sources, on the other hand, data is obtained from various paid subscriptions, vulnerability databases, as well as through technology partnerships with other companies. In addition, the UserGate Monitoring and Response Center has its own traps (honeypots), which are used to study actual illegal activity on the Internet. Based on this experience, both collected as a result of investigations of incidents and obtained by studying external materials, the specialists of the center develop new and update existing signatures of hacker attacks.
The Monitoring and Response Center allows users of UserGate solutions to stay with the most up-to-date and effective protection. If necessary, MRC-UG specialists are ready to join in solving problems at the client's site.
UserGate creates its own signatures based on:
- Malicious traffic samples
- Public proof of concept of vulnerability
- Information from various CERTs
- Analysis of collected IoCs