New Threat Intelligence Research Unit For Advanced Attacks: Fidelis Security

Fidelis Threat Intelligence Unit provides customers with access to vital network visibility research

May 3, 2011

3 Min Read


WALTHAM, MA– April 27, 2011 – Fidelis Security Systems, the market leader in network visibility, analysis and control solutions, today announced the establishment of the Fidelis Threat Intelligence Unit, which provides customers with access to vital network visibility research. The patented Deep Session Inspection' architecture in Fidelis XPS™ is key to this initiative, which takes network security beyond what has been possible with traditional tools, giving customers real-time visibility deep inside the content at the session level, where today’s advanced threats occur. The purpose of the Threat Intelligence Unit is to provide customers with timely guidance about what types of policies they can activate on their Fidelis XPS network security sensors to meet the challenges posed by threats they face on their own networks.

The program, which was launched in the fourth quarter of 2010, delivers research in the form of monthly policy packs, which are freely available to Fidelis customers. The data supporting these packs is collected through various outlets, including consultations with customers and through a continuous survey of the information security landscape. The monthly policy packs include pre-configured rules that customers can simply turn on to receive the benefits of the Threat Intelligence Unit’s research, or they can customize the policies for their own environments.

What sets the Fidelis Threat Intelligence Unit’s research apart from the type of signature-based policy sharing that IPS providers offer is the depth of inspection, visibility, and control the technology provides, as today’s threats often evade traditional signature-based network security solutions. Fidelis’ research organization provides the most comprehensive analysis, intelligence and guidance, which enables customers to fully leverage Fidelis XPS’ advanced technology.

“Advanced threats make mincemeat of signatures,” said Will Irace, Director, Threat Research & Services at Fidelis. “We are leveraging our content analysis capabilities to create rules that are not based on signatures, but on the underlying content that flows across networks. We delve much deeper into content, and we are getting useful feedback that allows us to understand how these rules are working in customer environments, which in turn gives us a chance to go back and tweak for future policy packs.”

In the near future, a feed infrastructure will be implemented to allow customers to automatically download policy updates as they become available. The feed infrastructure enables Fidelis researchers to create rules that are timely or relevant to a particular security threat and deliver them automatically to customers who choose to participate.

“The feedback has been great,” said Peter George, CEO of Fidelis Security Systems. “Over the last six to twelve months, we have seen a huge need for timely threat-specific policy, particularly among enterprise customers. We recognize that some commercial companies don’t always have access to the same level of attack detail that our federal government customers do. Therefore, we are making it easier for them to get the latest threat intelligence while taking full advantage of the power of our technology.”


About Fidelis Security Systems Since 2002, Fidelis Security Systems has been providing organizations with the network visibility, analysis and control necessary to manage advanced threats and prevent data breaches. Built on a patented Deep Session Inspection', platform, the Fidelis Extrusion Prevention System' is the industry's only network security solution capable of seeing, studying, and stopping advanced threats in real-time by uniquely working at the session-level where today’s threats occur. Fidelis enables their government, military, and commercial enterprise customers around the globe to achieve proactive situational awareness, content protection, threat mitigation, and application activity control. Visit to learn more.

Read more about:

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights