The Smiddle Security Administration Platform is a system that automatically collects and processes Indicators of Compromise (IoC) according to specified parameters.
Our solution has the ability to collect threat information from a large number of different types of sources and in different formats, automatically normalizes, validates and prepares it for security tools.
This allows you to adjust the load and use firewalls and other security tools more efficiently.
This solution can collect IoC from various sources that are available via links (URLs) or downloaded from a file and in different formats, such as websites (HTML), the special format for IoC (STIX), text files (eg TXT, PDF) and others.
Smiddle is an international software developer. We don't just build software; we turn ideas into innovative products that change the world. Each project for us is a challenge that we take on with great responsibility and enthusiasm. We value each of our partners and each user of our products.
Your success is our success, and that's why we work to the limit to provide you with the highest level of satisfaction and convenience. Our mission is to create products focused on the needs of our customers. Each of your projects receives our undivided attention. We offer complex solutions, technical support and consulting support.
No, we currently do not have our own sources with lists of indicators of compromise.
But, if necessary, our implementation team can recommend some of them depending on the available security tools and the specifics of the organization.
SSAP actually consists of three modules (Aggregations, Distributions and Inventories). The Aggregation and Distribution modules are mandatory for the complete operation of the solution, because they perform the role of collecting, processing and preparing clean lists.
The Inventory module is additional and expands the functionality by integrating with the Cisco Secure Firewall Management Center, which allows you to send to it from the SSAP console lists with indicators and collect operation statistics.
SSAP includes three modules (Aggregations, Distribution and Inventory), each of which requires a separate license.
The Aggregation and Distribution modules are mandatory for the operation of the solution and are licensed according to the number of nodes of such modules. In turn, the Distribution module extends SSAP functionality by native integration with Cisco Secure Firewall Management Center, and is licensed depending on the number and models of sensors connected to Cisco Secure FMC.
In any case, you can contact us for consultation and demonstration
To download IoCs from SSAP, a standard interface for security devices that works with STIX/TAXII protocols is used, that is, any security device that supports interaction using this protocol can connect to SSAP and download lists with "clean" indicators. And the presence of an open API in each of the modules allows you to make other integrations.
You can download indicators to the SSAP database either as a file or as a URL with the following source formats: MISP, STIX, STIX/TAXII, HTML, TXT, XML, PDF, CSV. After processing the indicators, their validation, normalization, it is possible to download them to the security device.
In SSAP, it is possible to control licenses for Cisco Secure Firewall and private IoC sources, this is done as follows:
In SSAP, the function of assessing the quality of the source is implemented. This allows you to assess how suitable the source is for each specific implementation.
In order to evaluate the quality of the source, SSAP uses metadata formed on the basis of information about the sources, such as the total number of indicators, duplicates, indicators from white lists, etc., as well as from data from security devices about the number of activations of these indicators.
After that, the SSAP algorithms analyze the received data and assign a rating to each of the sources.
SSAP does not have its own sources with indicators of compromise, and works exclusively with sources added to it. But SSAP helps automate the process of taking IoC from the source according to the schedule, or uploading a new batch of indicators. If the threat became known very recently and the source already contains this indicator, you will receive it in SSAP. After all checks, as soon as the indicator gets into the database of "clean" indicators. It can be unloaded onto a security device upon request.