Skip links

Fidelis Network

NDR platform for data protection, analysis, detection and response

Fidelis Network is a proactive NDR solution that provides visibility, advanced detection and accelerated response to cyber threats in on-premises and cloud environments. This solution prevents data theft, builds attack tactics, techniques and procedures, performs retrospective analysis and implements proactive network security.

Solution overview

Fidelis Network provides the following functionalities:

  • Brings together real-time and retrospective analysis with Data Loss Prevention (DLP) solutions for network, email and web traffic, identifying/preventing threats and data leaks,
  • Scans network traffic bidirectionally,
  • Deep Session Inspection (DSI) technology uses sensors to provide contextual metadata for all file formats and content, across all ports and protocols, at enterprise-wide scale,
  • Reduces response time from hours to seconds thanks to extended network visibility, multiple response techniques and automated response flow,
  • Machine Learning (ML) identifies potential threats that are difficult to spot with traditional detection tools.

How does Fidelis Network work?

Fidelis Network works based on the following mechanisms:

Analyze network threats at up to 20 Gbps/sensor

Collects over 300 metadata and attributes to provide deep visibility and superior threat detection

Automatically profiles and classifies all network resources, automatically calculates security risks based on vulnerabilities and priorities

Perform Conduct Packet Capture (PCAP) or layer 7 analysis

Profiles TLS encrypted traffic

Logs the content and complete metadata of any network communication that violates the security policy

Decode content based on protocol or application

Gain contextual visibility by mapping the entire cyber "terrain" using passive identification, profiling, classification, risk analysis, vulnerability analysis and threat detection

Allows placement of sensors throughout the network; sensors allow management of ingress and egress traffic, which increases visibility and control over how information is used

Key features

Fidelis Network offers the following functionalities:

Threat analysis: cloud-based sandboxing and anomaly detection using Machine Learning,

Active detection of threats: automatic correlation of alerts; threat mapping,

Threat hunting: content analysis in real time; retrospectively indexed metadata; fast, iterative and interactive queries for testing search hypotheses,

Data Loss Prevention (DLP): profiling and classification of data; predefined policies for known compliance regulations in network, email and web sensors,

Deep Session Inspection (DSI): deep search of hidden files; real-time content analysis,

Minimalist equipment 20GB 1U: allows fast data processing, but takes up very little space in the rack,

Email security: detection of internal "spray" attacks for SaaS (Software as a Service), email or local network; analysis of pre-click URLs and of attachments;

Profiling TLS encrypted traffic: differentiates human browsing from virtual machine generated traffic; detect hidden threats,

Multiple categories of sensors: provides protection against advanced inbound and outbound threats; prevent data leakage; detects threats through the Active Threat Detection (ATD) function, but also lateral movements, suspicious hosts, malware and abnormal behavior,

Threat Intelligence: uses open feeds (Fidelis Insight®, Reputation, STIX/ TAXII, YARA, Suricata as well as custom rules and indicators,

Integrated Deception: automatic implementation of decoy and breadcrumbs techniques.

Flexible deployment

Fidelis Network is licensed based on the volume of traffic analyzed and allows for both an on-premises (physical or virtual machines) or cloud deployment (managed by the customer or the Fidelis Cybersecurity team).

The Fidelis Network solution can be used individually or as part of the Fidelis Elevate eXtended Detection and Response (XDR) platform.

Services provided by Safetech Innovations

Our IT security systems integration services include:

Requirements analysis and system design

Requirements analysis and system design

Analysis of project objectives, requirements and constraints, identification of risks, design of integrated architecture, development of a detailed project plan for the integration of various components and subsystems

Implementation

Implementation

Delivering and installing products, configuring, testing, implementing and optimizing the integrated system, verifying that all components work together as planned, training system administrators on how to use the solution

Technical support and service

Technical support and service

Providing technical support and service to ensure the continuous operation of the system optimally, meeting the needs of the organization.

Collaborating with Safetech Innovations brings you the following specific benefits:

– The solid experience of professionals in the field of cyber security – We have 12 years of activity and over 600 completed projects in this field for clients from multiple economic sectors. Currently, Safetech Innovations employs over 60 employees, of which 40 are members of the technical team.
– Our Cyber Security Expertise – We have certified know-how in cyber attack and defense techniques and expertise in:

  • Analysis of existing/potential threats and vulnerabilities,
  • Risk assessment and business impact,
  • Consultancy to ensure the confidentiality, integrity and availability of information,
  • Implementation of the necessary solutions in order to achieve an optimal level of security, which will maintain a healthy business in the long term,
  • Continuous event monitoring and response to cyber security incidents.

Choosing Safetech's project implementation services ensures you reduce the risks of implementation, customization, scalability and flexibility, post-implementation support.