FacebookTwitterLinkedInYouTube


Support Login  |  Partner Login  |  Contact Us
products section

Deep Session Inspection

Built on the patented Deep Session Inspection® architecture, Fidelis XPS is able to understand the context of data flows in the particular network being protected, and any unauthorized exodus of data can be identified and prevented from ever leaving the network.

As Fidelis owns all of the solution’s intellectual property—from network sniffing through content analysis—customers are ensured that Fidelis XPS has the ability to continue to meet all of their requirements for comprehensive information protection.  Unlike other providers who purchase document cracking and content analysis components from third parties, often designed for database indexing or search applications, Fidelis XPS has been built from the ground-up, via its Deep Session Inspection architecture, to provide a robust network security solution for advanced threat management and data breach prevention. 

Fidelis XPS was designed specifically to see, study, and stop advanced threats. Its patented Deep Session Inspection technology employs a unique five-step process to analyze network traffic--giving you the visibility, analysis, and control options you need to stop data from leaving the network. Combining accuracy with speed, the steps are executed in memory (not on disk) so that advanced threats and data breaches can be prevented in real time even on multi-gigabit-speed networks.

Step 1. Packet Capture: Capture packets flowing across the network either out-of-band or inline on the network.

Step 2. Session Reassembly: Reassemble Session packets in memory into sessions in order to conduct deep session and payload inspection.

Step 3. Channel Control: Analyze channels and automatically execute usage policies. Provides port-independent visibility and granular control to the channels and applications running on the network, giving an organization the ability to see and control what is occurring across the network and detect and contain traffic that creates significant data leakage risk.

Step 4. Payload Decoding: Analyze the sessions for document type rules and expose the content inside the documents for analysis. Extracting content into independent format for analysis.

Step 5. Content Recognition and Analysis: Multiple content analysis technologies. Can be logically combined. Sophisticated statistical and pattern-recognition content analyzers to identify critical or sensitive information based on its characteristics.
 


When a policy violation is found, Fidelis XPS issues an alert and can also drop the session or inject resets (based on the configuration), giving you a host of possible actions from preventing the data from leaving the network, to redirection, quarantining, encryption, throttling, or notification.

Fidelis XPS is the only prevention solution that can be implemented out-of-band—preventing data breaches with no impact on network performance allowing you to begin reducing the risks of data breaches immediately, without the overhead of extensive network reconfiguration. In addition, Fidelis XPS reports all extrusion attempts to its management console, CommandPost, providing a single point for alerting and a database of full forensic information for investigation of events.

secondary navigation resources