Cisco Security Monitoring, Analysis, and Response System
Developer | Cisco Systems |
---|---|
Working state | End-Of-Support |
Source model | Closed source |
Latest release | Cisco Security MARS Appliance 6.2.2 / May 12, 2014 |
Available in | English |
Default user interface | Graphical user interface |
Official website | Cisco MARS |
Cisco Security Monitoring, Analysis, and Response System (MARS) was a security monitoring tool for network devices. Together with the Cisco Security Manager (CSM) product, MARS made up the two primary components of the Cisco Security Management Suite.
MARS was an appliance-based solution that provided insight and control of existing security deployments. It could monitor security events and information from a wide variety of sources, including third-party devices and hosts. The correlation engine in MARS could identify anomalous behavior and security threats and could use large amounts of information collected for forensics analysis and compliance reporting.
Features
- Learns the topology, configuration and behavior of your environment
- Automatically updates knowledge of new Cisco IPS signatures, for up to the minute reporting on your environment
- Promotes awareness of environmental anomalies with network behavior analysis using NetFlow and syslog
- Provides simple access to audit compliance reports with more than 150 ready-to-use customizable reports
- Makes precise recommendations for threat mitigation, including the ability to visualize the attack path and identify the source of the threat with detailed topological graphs that simplify security response at Layer 2 and Layer 3
- Integrates with the Cisco Security Manager to correlate security events with the configured firewall rules and intrusion prevention system (IPS) signatures that can affect the security event.
Supported Types
MARS centrally aggregates logs and events from a wide range of popular devices:
- network devices (such as routers and switches)
- security devices and applications (such as firewalls, intrusion detection systems vulnerability scanners, and antivirus software)
- hosts (such as Microsoft Windows, Sun Microsystems Solaris, and Linux syslog)
- server-based applications (such as databases, Web servers, and authentication servers)
- network traffic (such as Cisco NetFlow).
References
External links
This article is issued from Wikipedia - version of the 9/3/2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.