Application Library

Easy Installation & Start Up of Open Source Monitoring, Analysis and Security Applications

Leveraging the Power of Open Source and 3rd Party Applications

Government agency, service provider and commercial enterprise IT and Security Managers want to leverage 3rd party and open source applications within their networks. Rapid deployment of such applications on high performance platforms reduces overall IT costs while delivering state of the art network monitoring, analysis and security solutions.

Benefits

  • Savings
    Significantly reduce the time, effort and resources required to identify, source and deploy open source applications.
  • Easy Access
    Instant access to open source applications, downloadable at no charge.
  • Simplified Implementation
    Includes a RPM package of the software files, documents and configuration files native to the open source software as well as application profiles and initialization scripts.
  • Industry Leading Cyber Application Platform
    Bivio Cyber Security Application Platforms are high performance, fully programmable, standard Linux network appliances, supporting one or many applications on a single platform.

Applications

Several leading edge open source cyber applications are available to and are being deployed by corporate and government IT and security managers today, particularly to address network security, flow analysis, and traffic monitoring requirements. Some of the most frequently deployed cyber security applications and tools are described below.

Argus
Audit data to support network operations, performance, and security management; including network forensics, non-repudiation, network asset and service inventory.
Arpwatch
Provides alerts on modifications to ARP tables.
Barnyard2
Offloads the processing of the SNORT® unified2 binary output into textual or database type formats.
Bro
Network intrusion prevention and detection application using event-oriented analysis for network traffic analysis and network security monitoring.
nProbe
Scalable network monitoring architecture that passively monitors and collects netflow information on high-speed network links.
nTop
Network traffic probe that displays network usage.
pads
Signature-based detection engine to passively detect network assets & complement IDS technology.
p0f
Versatile tool to profile network users and activities including OS identification.
SANCP
Creates network connection and traffic logs for auditing, historical analysis and network activity discovery.
SiLK
Delivers historic and real-time analysis of network traffic.
SNORT®
Network intrusion, prevention and detection system that combines the benefits of signature, protocol and anomaly-based inspection methods.
Squid
Web caching proxy for HTTP, HTTPS, FTP, and others that reduces bandwidth and improves response time.
Suricata
High performance Network IDS/IPS and Network Security Monitoring engine, developed by the Open Information Security Foundation (OISF).
TCPdump
Open source tool for capturing and analyzing packets.
YAF
Network flow recording program that processes packet flows into IPFIX format for later analysis.

Easy Installation & Start Up

Bivio Networks has significantly reduced the time, effort and resources required to identify, source and deploy open source applications for network monitoring, analysis and security solutions. Our Application Library provides many leading 3rd party and open source applications certified on the family of Bivio Cyber Security Application Platforms.

As a value-added service, Bivio can also pre-install the open source applications on new orders for Bivio Cyber Security Application Platforms. Contact us for more information.

Infocenter


White Paper: Open Source Software for Cyber Operations

For the last decade, the use of open source software (OSS) in corporate and government environments has steadily increased, a fact not only due to the significant number of available applications but also to the widespread acknowledgement of the technological and business advantages that are realized with OSS deployments.

Ready to get started?

Request a product evaluation today!