Enea launches Qosmos Threat Detection SDK

Sept. 14, 2023
The Qosmos Threat Detection SDK was built out of direct feedback and collaboration with customers as a result of a growing need identified in the market.

Enea, a leading provider of telecom and cybersecurity solutions, today launched the Enea Qosmos Threat Detection SDK. This revolutionary threat detection system has the potential to double performance in network-based cybersecurity solutions.

The Qosmos Threat Detection SDK enables the integration of Enea's flagship deep packet inspection (DPI) engine, Qosmos ixEngine, with core IDS capabilities drawn from Suricata, the widely trusted open-source Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) solution, significantly enhancing performance and scaling for large, multifunction cloud-based platforms. 

The Qosmos Threat Detection SDK facilitates easy integration into third-party software developed by cybersecurity solution vendors, large organizations, and managed service providers, and enables the creation of custom rules tailored to unique network environments. The Qosmos Threat Detection SDK is fully scalable, ensuring customers benefit from simplified licensing, improved accessibility, and optimized operating costs.

Cloud, IoT, and remote working have transformed cybersecurity and accelerated the development of cloud-based, multifunction security platforms. These platforms have extreme performance demands and require detailed, real-time traffic visibility based on a far broader range of protocols and applications. By drawing on the DPI-based traffic visibility of Qosmos ixEngine and combining it with core IDS functionalities, Qosmos Threat Detection SDK meets these challenges. It delivers cybersecurity performance improvements up to twofold from traditional IDS/IPS systems. It leverages a single network traffic visibility function, eliminating the need for dual packet processing, and ensures highly efficient network traffic data processing at scale without compromising speed.

The integration with Enea's Qosmos ixEngine, the de facto industry standard for embedded DPI, delivers superior traffic visibility. In particular, the software development kit enables improved visibility into encrypted and evasive traffic, which, in turn, greatly boosts overall malware and threat detection, and it significantly reduces false positives through improved parsing. Customers can further use this enhanced visibility to improve security performance by creating custom rules tailored to their environments.

The Qosmos Threat Detection SDK was built out of direct feedback and collaboration with customers as a result of a growing need identified in the market. Two leading vendors have already deployed it, with increasing interest from Enea's customer base. 

Jean-Pierre Coury, Vice President of Enea Traffic Intelligence, commented, "Faced with the performance and scale requirements of today's cloud-centric, multifunction IT platforms, traditional IDS/IPS systems are falling behind. Enea Qosmos Threat Detection SDK meets these challenges with a threat detection engine delivered in the format of a software development kit capable of tight integration with third-party solutions, easy customization, and radically improved cybersecurity performance."

Roy Chua, Founder and Principal at AvidThink, said, "Modern cybersecurity models such as zero-trust networking access and extended detection response pivot around DPI, a trusted technology we all know, but one that's evolved to meet the needs of the threat landscape today. A strong DPI engine is central to high-performance threat detection. Not only does it enable visibility into network traffic, but it also provides the intelligence around which to base custom rules that customers can tailor to their specific environments."

To learn more please visit: https://www.enea.com/solutions/dpi-traffic-intelligence/threat-detection-sdk/

Sponsored Recommendations

EPS releases new switch erasure update with power automation

The feature is designed to dramatically improve the simplicity and productivity of erasing network devices.

What Missouri courts learned from a cyber attack

The ordeal highlighted both opportunities to improve as well as strengths that helped stop the incident from becoming a full-blown crisis.

Dallas ransomware: Hackers used stolen credentials to access city data, report says

Hackers used stolen online credentials to get into the city of Dallas’ system and steal files during a cyberattack earlier this year, according to a city internal review of the...

Pros & Cons: Bleeding Edge Security Tech

A closer look at the benefits and risks as integrators turn to newer, largely unproven technologies to improve margins