Fidelis Network®

Best-of-Breed Breach Detection and Data Loss Prevention (DLP)

Take your security to the next level. 
Map your cyber terrain and prevent and detect threats.

 

See More, Inspect More

Identifying threats and data leakage requires deep inspection and analysis of all forms of content, including unpacking and extracting deeply embedded files. Fidelis Network bi-directionally scans all network traffic, regardless of port or protocol, to reveal the network and application protocols, files, and content with sensors in five locations (direct, internal, email, web and cloud).

Fidelis Network Alert List

Never miss an attack
or data leaving your network

  • Patented Deep Session Inspection®and  Deep Packet Inspection give you unique visibility across all ports and protocols into content and context in real-time
  • By capturing and storing rich metadata for months, you have retrospective analysis for automated security analytics on frequency and sequencing, machine learning anomaly detection, investigations,  and improved threat hunting
  • Automatically discover and classify data, tag content and understand behavior anomalies to prevent unauthorized transfers out of your network, email and web traffic

 

Map Your Cyber Terrain

Map Your Cyber Terrain

Automatically profile and classify IT assets and services including enterprise IoT, legacy systems and shadow IT to map your cyber terrain. Adding Fidelis Endpoint provides software inventory and known vulnerabilities with CVE and KB links, plus security hygiene for patches and endpoint status. You can even import third party external sources to enrich cyber terrain knowledge.

Get Deep Visibility Across Your Stack

  • Get visibility of all ports and protocols with DPI, DSI (Layer7), and PCAPs bi-directional analysis with full session reassembly in real-time
  • Protocol, application, and deep content decoding with recursive extraction
  • Place sensors across direct, internal, email, web and cloud traffic for wide visibility
  • Automatically profile assets and your cyber terrain 
  • Benefit from structured and enhanced metadata for over 300 attributes, indexed for fast queries 
  • Tag content with custom tags 
  • Store metadata on-premises or in the cloud for 360+ days for retrospective analysis
     

Prevent Threats

Fidelis Network includes multiple sensors that can be placed throughout your network to enforce prevention policies. These sensors can be placed inline or out-of-band based on your network configuration and prevention tolerance.

Explore Fidelis Network

Multiple defenses in one platform

  • Threat Prevention using static signatures, multi-dimensional behavior rules, threat intelligence feeds, plus emulation and heuristics 
  • Threat intelligence open feeds (Fidelis Insight, Reputation, STIX/TAXII, YARA, Suricata) plus internal threat intel including custom rules and indicators
  • Threat hunting with real-time content analysis or retrospective indexed metadata supporting fast iterative and interactive queries to test hunting hypotheses
  • Data Leakage/Theft where direct and internal sensors drop sessions, email sensors quarantine, drop, re-route, or remove attachments, and web sensors redirect web pages or drop sessions
  • Profiling TLS encrypted traffic based on metadata and certificates, determining human browsing versus machine traffic, plus evolving data science models to detect hidden threats

Detect Threats

By conducting real-time network content and context analysis and identifying behaviors that indicate compromises, Fidelis Network provides automated detection for the proactive discovery of attackers, suspicious hosts, and malware.

Fidelis Network Alert List

See everything leaving the network

  • DLP using data profiling and classification with pre-built policies for known compliance regulations across network, email and web sensors to alert on policy violations 
  • Email security including internal email spray attacks for cloud SaaS email or on-premises with pre-click URL analysis, attachment analysis, and OCR image to text analysis for data leakage
  • Security analytics based on high and low frequencies, plus sequencing analysis
  • Threat Detection using cloud-based sandboxing, network behavior analysis, new threat intelligence automatically applied to retrospective metadata, plus machine learning anomaly detection 

We’re able to observe more – more aspects, more activities and more methods used during an attack. Thanks to Fidelis our security dramatically changed.

- IT Director, Marek Laskowski, DZP
 
Fidelis Conclusions

Eliminate Alert Fatigue and Automate Response

Fidelis Network automatically validates, correlates, and consolidates network alerts against every Fidelis managed endpoint in your network. Minimize false positives and shift from clues to conclusions so you can quickly address the alerts that matter most.

Focus on what matters

  • Derive conclusions within one solution with aggregated alerts, context, and evidence
  • Expose misuse of assets and encryption, plus discover proxy and security circumvention 
  • Zone in on what matters with risk scoring, behavioral and historical analytics, and policy and alert management
  • Integrate with your enterprise security stack with an open policy interface, and the ability to send alerts and data to your SIEM or SOAR
Validating Network Alerts at the Endpoint with Fidelis Elevate™
Fidelis Elevate Video
Resource: Video
Learn how to automatically validate network alerts at the endpoint.
Fidelis Network Module

The Cornerstone of
Your Security Stack

Fidelis Network provides the rich metadata as the DNA to understand content, context and behavior across you mapped cyber terrain. From there you can build upon this cornerstone adding deception and endpoint detection and response. 

Work seamlessly to classify, prevent, detect, investigate and respond in one platform

  • With deception you can automatically profile your assets and deploy accurate deception decoys and breadcrumbs
  • Understand TLS encrypted traffic anomalies based on metadata and certificates, plus human versus machine traffic profiles to detect malware and C2 communications
  • Quickly search and query rich metadata stored on-premises or cloud from network sensors and endpoint, plus build and save advanced queries using Boolean logic, a step beyond faceted search
  • Automate detection, investigations and response with pre-built scripts and playbooks 
  • Leverage open source threat intelligence and apply it across network sensors and endpoints
     
Fidelis Insight

Leverage Threat Intelligence and Research for More Accurate Detection

With Fidelis Insight you can rapidly detect and respond to threats in your environment, even when they occur in the past. By analyzing real-time and historical data, sandboxing files, and applying machine learning analysis, Fidelis Insight provides curated threat intelligence and behavior rules to Fidelis Network. 

Go one step further with Fidelis Threat Research as a service (TRaaS), and receive on-demand access to threat research experts who can provide anything from intelligence concerning adversaries, to malware analysis and reversing. 

 

Flexible Deployment Options:

On-Premises

  • You maintain and manage all appliances and software
  • Fidelis professional services assists with deployment and training
  • Available network sensors include: Direct, Mail , Internal, and Web
  • Maintenance fees includes intelligence updates from Fidelis Threat Research Team
  • License additional appliances, sensors as your needs grow

In Cloud

  • Infrastructure maintained by Fidelis, so you can focus on security
  • Rapid deployment and immediate implementation
  • Scale up as you grow with as many software sensors as you need
  • Uninterrupted service as you transition from a trial to production
  • Simplified subscription pricing based on your bandwidth and storage needs

Let’s Get Started!
Ready to see how Fidelis Network
redefines your security stack?
Schedule a Demo Read Datasheet