Bird_banner_small5
Attack Detection

TELUS Security Labs offers several attack detection solutions: A vulnerability attack detection feed in Snort rule format, a malware attack detection feed in Snort rule format, and an outsourced signature program using client proprietary formats.

Vulnerability Signatures

Offered as a yearly subscription, we provide a same-day feed of Snort rules based on the detailed output of our Vulnerability Research Service. By developing our signatures from the analysis of the vulnerability, we are able to provide broader-based, proactive protection than those based solely on a circulating exploit. A higher quality approach that provides protection not only against any current exploits, but zero-day emergences and derivative exploits as well.

Malware Signatures

Also offered as a yearly subscription, we provide a same-day feed of Snort rules based on the detailed output of our Malware Research Service. This service focuses on agent-less network-based detection of both run-time and malware propagation behaviour. All signatures are tested using live malware in real environments and optimized for low false positives.

Outsourced Signature Development

In addition to the Snort feeds described above, we also offer mixed and customized signature feeds, developed for, and tested on our client’s proprietary detection engines. We install and configure client devices in our labs to ensure a high quality, drop- in signature feed. As a value-add, TELUS Security Labs offers signature set management programs, focused on complete outsourcing of our client’s signature selection, development, and maintenance based on our client’s priorities and capabilities.

Please see our contact page for information on obtaining one of the most intelligent signature subscriptions in the market.