The ongoing battle to protect an organization’s protected and sensitive information requires sustained vigilance, as threat actors are determinedly focused on the theft, or exfiltration, of protected information, continually evolving their attack methods to bypass organizations’ security countermeasures.
As attacks have become more customized and have moved further up the architecture to the application layer, traditional security tools—particularly signature-based products—struggle, making it challenging for traditional inbound threat mitigation measures to actually defend against the threat.
Fidelis XPS: Network Visibility, Analysis & Control
Built on a patented Deep Session Inspection®, platform, Fidelis XPS™ is the industry's only network security monitoring solution capable of seeing, studying, and stopping advanced threats in real-time by uniquely working at the session-level where today’s threats occur—plugging the holes packet-level technologies leave open for custom attacks.
Fidelis XPS provides organizations with the network visibility, analysis, and control necessary to manage advanced threats, analyze forensics data more intelligently, and prevent data breaches.
With a single policy and analytics engine for tightly integrated network visualization analysis, and control, Fidelis XPS gives you the power to move quickly, efficiently, and less expensively to respond effectively to threats—as they occur.
See It: Visualize the way information is flowing on your network at the application, payload, user, and content levels.
Study It: Selectively identify, record, and analyze sessions of interest based on policy.
Stop It: Take a real-time action, including a prevention or blocking action, on sessions that violate your security policies.
Learn more about Fidelis XPS industry solutions for financial services, government, critical infrastructure, defense industry, and life sciences & healthcare organizations.
Proactive Situational Awareness
Fidelis XPS’ robust controls enhance the network security architecture, enabling an organization to achieve proactive situational awareness. In fact, because Fidelis XPS is uniquely built to visualize, analyze, and contain threats in real-time, the ability to be proactive in your battle against today’s most sophisticated threats is one of the solution’s most powerful benefits.
Visualize Network Activity in Real-time—Through the Fidelis XPS Information Flow Map™ feature, organizations can obtain real-time visibility into content over, all ports and protocols. Find suspicious network activity including strange protocols on strange ports going to foreign countries, sensitive data, or traffic bypassing your corporate secure email gateways and web proxies.
Analyze with Greater Speed—Record network sessions of interest, allowing an organization to quickly study details about the session. With quick, one-click access, all attributes about the session, the users involved in the transaction, and the session itself can be seen including all layers of encoding and obfuscation.
Granular Control - Fidelis XPS’ granular controls allow for several mitigation options including the ability to prevent network sessions, therefore stopping the spread of an attack within your network. Once Fidelis XPS detects the threat, any network session can be terminated including the attacker’s command and control channel.
back to top
Regardless of the source of a data breach, a trusted insider or a malicious threat actor from the outside, Fidelis XPS provides protection for your most valued information.
Identity Information - With its patented Deep Session Inspection® engine and Smart Identity Intellectual Profiling™, Fidelis XPS delivers the visibility and control into data transfers on the network, enabling implementation of the desired controls to protect identity information.
Digital Assets & Property - Fidelis XPS provides the premier control for managing the transfer of digital assets—classified information, operational security information (OPSEC), design documents, source code, planning documents, financial statements and other proprietary information—over computer networks via Fidelis XPS's patented Deep Session Inspection engine and robust content analysis methods—granting the visibility and control into data transfers on the network to enable implementation of the desired controls to proprietary information.
back to top
Application & User Activity Control
The ability to control application and user activity on all network-based applications, including those from the new threats such as social networking sites/applications, is unique to Fidelis XPS. With Fidelis XPS' Deep Session Inspection platform, and its native port-independent inspection covering all 65,535 ports, it provides the most robust architecture for visibility, analysis, and control of the applications in use on the network.
•Network-Based Application Control - Fidelis XPS provides bi-directional visibility of and control over the protocols and applications running on the network, enabling your organization to see how the network is used for communication. With port and protocol independence and proxy-less inspection native to its Deep Session Inspection platform, Fidelis XPS goes beyond packet analysis by providing Deep Session Inspection and payload reassembly, giving organizations the ability to manage both tunneled applications and application-specific functionality, all without the hassles of desktop and server configuration changes, and without negative impact on performance.
Social Networking Management - Social networking has become ubiquitous in today's enterprises. As social networking has become common place in the work environment, it is typically no longer practical to blacklist the entire site, but the risks of a data breach remains high with many surveys showing social networking applications growing in risk for data leakage. As the only solution to provide specific features to manage these applications, Fidelis XPS provides comprehensive visibility into and control over social networking network traffic, and enables fine-grained controls of particular social networking activities.
User Awareness – With the ability to associate any network activity to a specific user identity in real-time using dynamic IP address to user identity (IP-to-ID) mapping technology, Fidelis XPS automatically identifies the activities of individual users or directory-based groups. An organization can gain user-level visibility over previously "anonymous" network activities, such as: the use of business and consumer "cloud" applications, thereby eliminating a blind spot that is growing larger and more important every day, track the activities of an advanced persistent threat, producing lists of specific users affected by an attack; and aid in incident response and investigations with alerts mapped to users.
back to top
Fidelis XPS’ ability to mitigate threat, such as detecting malicious activity, including traffic to rogue destinations, and integration of threat intelligence feeds gives robust controls to enhance an organization's network security architecture to enable threat mitigation at the application level, user targeted attacks, and other non-normal traffic.
Malicious Activity Detection - Fidelis XPS creates a malicious activity “safety net” to provide visibility, analysis, and control over potential malicious activity including: port-independent inspection covering all 65,535 ports; content inspection for protected/sensitive information; content inspection for malicious traffic and payloads; port-hopping/tunneling detection; data flows to unexpected countries; and rogue encryption at both the network and file level.
Actionable Threat Intelligence Feeds—Integrated threat intelligence feeds provide dynamic, reputation-based policy updates to Fidelis XPS sensors, which then enforce those policies on network traffic in real time.Unlike signature-based solutions that are easy to evade, or reputational data tied to a small number of ports, Fidelis XPS brings real-time reputational knowledge to life for all 65,535 ports along with the unparalleled visibility and control of network traffic needed to mitigate today’s advanced and persistent threats.
back to top