Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

9/27/2010
11:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Emerging Threats Launches Premium Version Of Open IDS Ruleset

ET Pro is now available for Snort and Suricata

News Facts:

  • Today marks the arrival of Emerging Threats Pro, the premium version of the Emerging Threats open source IDS/IPS ruleset. Emerging Threats Pro builds upon the eight-year old open ruleset with an experienced, full-time research team and industry-leading vulnerability and malware research from Telus. The result is comprehensive coverage of security threats facing organizations today.

  • ET Pro is now available for Snort and Suricata, and will soon be available for other engines and technologies. Until now, customers looking for intrusion prevention solutions have typically been locked into a single ruleset provided by the vendor supplying their hardware or engine. Users now have a choice of commercial rulesets, breaking the existing monopoly and bringing innovation and competition back to this long stagnant market.

  • ET Pro builds upon and will continue to support the eight-year-old open source Emerging Threats ruleset. The proven reliability, diverse intelligence sources and rapid signature output of the Emerging Threats community is augmented by a highly skilled research team devoted to making a comprehensive ruleset.

  • As malware creation continues to rise, and threats become increasingly sophisticated, organizations need a threat research team that can release new signatures daily. ET Pro is supported by a full team of professional engineers from the open source community that will introduce new signatures to the ruleset as they are written. This team is focused on quality assurance (QA), load testing and 24/7 technical support for the rules.

  • With the addition of cost-effective site licensing options, conventional per sensor purchase, as well as professional technical support, ET Pro offers customers a complete IDS/IPS ruleset and intelligence package.

  • The existing Emerging Threats ruleset will still be available free of charge to community members, who will also benefit directly from the research and advanced engineering contained within the premium ruleset.

  • The ET Pro ruleset closely follows the recently launched Suricata multi-threaded open source IDS engine, allowing customers to combine speed and accuracy in both the engine and rules fueling their performance.

    Quotes:

  • “Malware is being introduced at a faster pace than ever before and requires advancements in rulesets and policies to effectively manage the evolving threat landscape,” said Matt Jonkman, founder and CEO of ET Pro and founder of the Emerging Threats Project. “The current commercial ruleset offerings do not adequately address the new threats our networks face, including malware, command and control channels, and information exfiltration. ET Pro takes all of these challenges head-on!”

  • "Although speed and power of IDS hardware and products has been increasing, the quality of the rules hasn’t kept pace," said Diana Kelley, partner at SecurityCurve. "There is a real market need for increased intelligence and ruleset quality for IDS products to ensure the solutions provide protection against new and emerging attacks."

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Manchester United Suffers Cyberattack
    Dark Reading Staff 11/23/2020
    As 'Anywhere Work' Evolves, Security Will Be Key Challenge
    Robert Lemos, Contributing Writer,  11/23/2020
    Cloud Security Startup Lightspin Emerges From Stealth
    Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-27218
    PUBLISHED: 2020-11-28
    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
    CVE-2020-29367
    PUBLISHED: 2020-11-27
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    CVE-2020-26245
    PUBLISHED: 2020-11-27
    npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
    CVE-2017-15682
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
    CVE-2017-15683
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.