CERNE - Intrusion Detection System

100Gbps Intrusion Detection System that enables 24/7 real-time network monitoring and access control

1M

USER-DEFINED SIGNATURES

100Gbps

LINE RATE PROCESSING

250,000

FILTERS FOR BACK IN TIME RECORD

Features of the CERNE

Compact Form Factor

The 100Gbps CERNE IDS Probe is complete in a 1U appliance for ease of installation, minimal footprint and distribution.

100Gbps Monitoring

Intelligent hardware allows us to monitor 100Gbps comfortably allowing real-time and historical threat investigations.

Intelligent Buffer

Flows can be recorded with a 2.5 seconds back-in-time buffer, providing the ability to gain complete visibility of what exactly happened leading up to the alert.

Alert Based

The CERNE records and exports relevant data to provide context around an alert. Recorded packets are organised in flows and indexed for rapid retrieval.

Integration

The CERNE integrates with existing SIEM architecture for automated threat intelligence configuration, session delivery and storage management.

User Portal

The CERNE User Portal enables analysts to view historical and on-going alerts in real-time of up to 1 million user defined signatures.

CERNE

Product Lifecycle

2019

100G CERNE - Latest generation CERNE IDS optimised to provide enhanced detection capabilities at full line rate.

2022

200G CERNE - Our latest development to provide rapid context before and after an event, whilst minimising storage required.

2015

40G CERNE - Our first ever high-rate IDS with automated flow processing of relevant network traffic.

2017

Implementation of the intelligent ‘back-in-time’ buffer feature. Providing analysts with rapid access to critical packets prior to an event, enabling real-time and historical threat investigation

CERNE

WHITE PAPER

The CERNE IDS features alert driven packet recording, minimising storage and retrieval latency to rapidly provide context before and an event.

Ransomware attacks, trends and how to protect against it

BLOG

Ransomware is the name for a type of malware cybercriminals use to block access to a computer system, files or data, demanding payment in order for the user to regain access.

Telesoft use cookies to improve your browsing experience.