Hillstone Isource: Extended Detection and Response (XDR) Solution

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Hillstone iSource

Extended Detection and Response (XDR) Solution

Hillstone iSource is a data-driven, AI-powered extended detection and response (XDR) platform
that integrates massive security data, investigates correlations of incidents, identifies potential
threats, automates security orchestration and responds cohesively across multiple security
products and platforms. It brings a radical new approach to cybersecurity with complete visibility,
highly accurate threats identification and swift containment and mitigation for unrivaled security
operation efficiency.

Product Highlights

Unified Data Collection from Multiple security Advanced ML-driven Analytics and Detection
Products with Full Visibility By synergizing the data and logs collected across the entire
Hillstone iSource collects various types of data, such as threat security fabric, as well as threat intelligence from top threat
logs and incident reports, from almost any source across intelligence sources, Hillstone iSource can discover even
Hillstone’s product stack and as well as 3rd party products. stealthy and evasive threats, and attribute the attacks.
By standardizing and integrating heterogeneous data across Powered by machine learning technology and statistical
components, including cloud, network and endpoints, iSource algorithms, its behavior analytics engine helps distinguish
breaks down security information silos. It not only brings full anomalous activities among a large amount of integrated
security visibility with far fewer blind spots, but also improves data. Its correlation analysis engine consolidates individual
detection accuracy and provides effective and efficient incidents for context awareness, and applies analysis to
defense against threats. correlated data to identify high-fidelity incidents, provide a

www.HillstoneNet.com © 2021 Hillstone Networks All Rights Reserved. | 1


Hillstone iSource XDR Solution

complete picture of an attack chain and further help in the tions with Hillstone security products and the ability to assign
investigation of the attack’s purpose. Its powerful log analysis tasks for collaborative case management. Besides predefined
has built in threshold- and status-based detection and correla- playbooks that offer optimized workflows and responses,
tion analysis capability that allows security analysts to define Hillstone iSource also offers the agility and flexibility to define
customizable rules to identify key threats via artifacts. The automated workflows visually in playbooks based upon
Search Processing Language (SPL)-based log search engine ingested incidents or alerts, intelligence queries and actions
also alleviates the pain of searching and analyzing massive of response. These playbook-driven responses combine
logs. automated tasks that can span multiple Hillstone devices,
such as Hillstone NGFW, NIPS, CloudEdge, CloudHive, etc.,
Comprehensive Vulnerability and Risk Management with manual tasks handled respectively through incident case
management. Certain 3rd-party devices can also be sup-
Hillstone vulnerability management helps identify and present
ported in playbooks via RESTful APIs or SSH connection. This
vulnerabilities by leveraging the industry’s leading vulnerability
enables swift incident triage and attack containment before
assessment solution. It also supports adding new scanners
damage can be done.
for customization or even manually importing a vulnerability
report file for further containment of threats.
Assets are the core for risk management. Hillstone iSource
Unified Management and Reporting with Intuitive and
provides comprehensive risk management to assets like
Customizable Console
servers, endpoints, or even applications and services, from The customizable dashboard allows simple and rapid access
multiple dimensions including risks, vulnerabilities and threat to the organization’s security posture with comprehensive
events. It presents statistical data, such as distribution and statistical information such as rankings and counters, as well
trends of threats and vulnerabilities, along with detailed infor- as incident summarization and security trends with graphical
mation of individual assets. This holistic approach protects charts and lists. The intuitive design provides an optimized
assets by identifying and mitigating potential exposures to user experience for management and operations. Hillstone
threats. iSource also supports template-based or customizable
reports that can be generated on schedule or on demand.
Automated Security Orchestration and Cohesive Public APIs enable integration with third-party tools or security
Response products to inject security data generated across the entire
security fabric and perform interactions to contain threats.
Hillstone iSource offers automated security orchestration and
response capability with built-in playbooks, integrated interac-

www.HillstoneNet.com © 2021 Hillstone Networks All Rights Reserved. | 2


Hillstone iSource XDR Solution

Features
Data Collection Vulnerability Management Reporting
• Support collection of data includes netflow, • Support statistical and detail information of vulner- • Support four report templates including overall
metadata, Syslog, Sysmon, Linux Syslog from abilities security risk, endpoints security risk, server
Hillstone’s security devices • Support import of third-party vulnerability reports security risk, and incident response report
• Support third-party device integration for data • Support integration with third-party scanners • Support optional function of report task
collection • Support periodic or on-demand report
• Support management of scanning tasks
Full Visibility • Support online preview
Information Management • Support export report in PDF/WORD format
• Support threat events monitoring, and visual-
• CVE hotspot threat information notification • Support email notification of report generation
ization of risky assets and risk trends
• Support intelligence database of DNS domains, • Support management of classified protection
• Support distributed display of threat geographic
malicious codes, IP, vulnerabilities, intrusion detec-
connections
tions, and geo-location System Configuration
• Support full-screen display of statistical and detail
• Support offline and online upgrade of the intelli- • Support management of user authority, Syslog,
information of overall security, servers’ security,
gence database by manually and periodically Netflow, logs storage, evidence information,
endpoints security, vulnerabilities, areas security,
and threat events • Support whitelist of global, DNS, and file network configuration, mail configuration, and
• Support blacklist of DNS, malicious code, and IP license configuration
Detection Rules • Support separation of powers
• Support rule configuration of threat detection Event Correlation Analysis • Support trusted host configuration
for scanning, file, HTTP detection, suspicious • Support correlation analysis of massive data and • Support integration with HSM
protocol, brute force, DNS, blackmail, mining, USB detection of kill chain
• Record of system logs
behavior, violating access, weak password, and • Support centralized and classified search of global
user-defined threats threat events • Sync-up with sBDS rules
• Support searching by key words, SPL, and pre-de- • Support HA and clustering up to 5 nodes
Threat Analysis
fined conditions
• Rule based threat detection Supported Platforms
• Threat log analysis Incident Response • Linux: CentOS 7
• Behavior analysis • Support case management system • Windows: Microsoft Windows 10
• Correlation Analysis • Case status update and review • VMware: VMware EXSi 6.7
• Statistics and analysis of risky servers, risky • Interactive devices/ services (security devices /
terminals, and threat events threat intelligence service)
• Support the evidence collection, processing and • Support third-party device integration over RESTful
status marking of threat events APIs or SSH
• SOAR playbook (with pre-defined playbooks)
Assets Management
• Support management of server assets, terminal Alerts
assets and unclassified assets • Support alarms based on threshold rules and
• Support grouping management of servers, traffic pulse rules
terminals and different types of server business • Real-time display of threat events
• Support automatic discovery of assets • Support alert notification of SMS, email and
• Support display of users’ status WebUI

Specifications
Models SG-6000-ISC6205 SG-6000-ISC6210 SG-6000-ISC6220
Performance Throughput 3Gbps 6Gbps 15Gbps

Event Processing 5000EPS 8000EPS 15000EPS

www.HillstoneNet.com
© 2021 Hillstone Networks All Rights Reserved.
Version: EX-08.01-iSource-2.0R5-1021-EN-01

You might also like