Cisco NetRanger Sensor network monitoring device

Model: NRS-TR-DM

Cisco NetRanger Sensor - Network monitoring device - 2 ports - Token Ring - rack-mountable

Cisco Secure IDS (Formerly NetRanger) is an enterprise-scale, real-time, intrusion detection system designed to detect, report, and terminate unauthorized activity throughout a network. The industry's first enterprise-scale intrusion detection system, Cisco Secure IDS is the dynamic security component of Cisco's end-to-end security product line. Cisco Secure IDS is an ideal solution for companies who need to know if their network is under attack from internal or external sources. Because Cisco Secure IDS incorporates user-defined feedback into the Sensor, the system can automatically "shun" or eliminate specific connections identified with the unauthorized activity. This feature can be temporary, if desired, or maintained indefinitely. The rest of the network traffic will function normally; only the unauthorized traffic from internal users or external intruders will be quickly and effectively removed. By changing Access Control Lists (ACLs) of Cisco routers instantly as unauthorized activity is detected, Cisco Secure IDS can dramatically improve security posture. The Cisco Secure IDS Director scalability and performance can centrally monitor the activity of dozens of Cisco Secure IDS Sensors located on different types of network connections. For extremely large, distributed networks with complex alarming and communication requirements, the Cisco Secure IDS Director can be implemented in a multitiered hierarchy, enabling a virtually unlimited number of Sensors to be monitored. Because the Director also remotely controls the configuration of the Cisco Secure IDS Sensors via an intuitive Java-based GUI integrated into a network management system, an organization can monitor the security of its connections from one centralized location, thereby consolidating personnel, reducing costs, and ensuring consistent security policy enforcement enterprise-wide. The Cisco Secure IDS Director can also feed alarm information into an adjacent database archive. Information such as the origin, type, destination, and time of attacks is all logged for trend analysis and may easily be used to generate custom graphs and reports. These outputs-which are based on real data-give an enterprise unprecedented capability to make solid operational security decisions regarding its network.

Have Questions? Call us now!

847-468-8900