Bricata’s detection engine is a high-performance signature engine, compatible with Snort and Suricata rules, optimized for modern hardware.

Bricata is a network cybersecurity solution supplier helping organizations harness the power of complete network visibility to detect, hunt, and prevent threats with the only commercialized open source and partner developed malware conviction engine.

Conventional IDS/IPS systems have lacked the innovation needed to address advanced threats, evidenced by the wide-scale adoption of Open Source solutions. Bro and Suricata are two of the leading engines many teams are using to create tools; but like most open source technologies, they can be difficult to build, deploy, and maintain in-house without the right expertise.

Bricata is closing the gap by delivering the first network security sensors with integrated Bro and Suricata engines. We simplify operations and maintenance with a middleware layer and central management console that makes signature, script, and policy management much easier, and delivers enterprise scalability with enhanced usability and performance.

About Suricata


Suricata is a free and open source, mature, fast, and robust network threat detection engine capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM), and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency.

The Suricata project and code is owned and supported by the Open Information Security Foundation (OISF), a non-profit foundation committed to ensuring Suricata’s development and sustained success as an open source project.

Optimized Signature Engine


With Suricata, Bricata leverages multi-threaded and multi-processor systems to inspect more traffic and employ a larger rules base. Greater performance means better detection. You can’t detect what you don’t inspect.

 More Rules, Faster Connections

Multiple Threat Intelligence Sources

Powerful Control, Greater Flexibility

From the Blog


Make it Harder to Hide: 3 Techniques for Conducting Threat Hunting at Scale

June 18, 2019

The law of large numbers theorem facilitates threat hunting at scale on large networks because it isolates unusual activity and network anomalies....

Read More

5 Fundamentals for Mitigating the Risk of Laterally Spreading Malware

The persistent risk of laterally spreading malware requires good execution of network security fundamentals including segmentation and internal instrumentation....

Read More

What is Suricata? Intro to a Best of Breed Open Source IDS and IPS

“ESG research indicates network security monitoring is most often the center of gravity for threat detection. In other words, SOC analysts detect suspicious......

Read More
Bricata Included as a Representative Vendor in the Inaugural Market Guide for Network Traffic Analysis by Gartner, Inc.
“Applying behavioral analysis to network traffic is helping enterprises detect suspicious traffic that other security tools are missing,” wrote Gartner analysts.
+ +