Grupo SantanderAenaciscoJunta de Andalucíaproduban

revolutionize leading networks

Because a new kind of technology is needed: Open, Scalable, reusable, collaborative


Sustainable IT

Next Generation applications that resolve problems like Network Intrusion, Network Visibility, Breach Detection & Mitigation System, Log Management.
All of them sharing a common Big Data based technical data lake in the revolutionary and open rB Horama Ecosystem


The sticky menu will be shown here


Freedom of choice

You decide if, when, how, and how big

We want you to be technologically free. All of the redBorder technology is Open and available for free download at Community, regardless of the magnitude of your business.

redBorder gives you access to source code so that you can avoid vendor lock-ins and modify or scale the software if you choose.



1+1=3 for the Hero

Our ultimate goal at redBorder is to empower companies and individuals alike so your networks can thrive. Horama’s unified and integrated framework contains resources for management, storage, intelligence, correlation and control.

The combination of these multiple information sources provides enhanced context to make better and more intelligent decisions. Detect threats before they become attacks. Be the hero of your network.



“We play big too”

Driven by power and scalability, redBorder Horama is designed to operate within the most demanding environments.

Using Open Source nowadays means leveraging leading technology in areas such as Cloud and Big Data. redBorder creates products using the same technology and philosophy as those employed by major Internet players, such as Google or Twitter. Our state-of-the-art technological products are readily implementable by your company.



We can create a more intelligent world

These days our systems are receiving massive amounts of information and it is impossible for us humans to analyze it fully.

redBorder Horama is an automatic system that filters through the “noise,” giving you all relevant information which can be nicely viewed in our integrated and unified dashboard.

With this increase of massive amounts of data we have the opportunity to create a more intelligent world.


New solutions for old and new problems


The ecosystem

Horama is the powerful ecosystem where you can have your network information correlated and fully unified

Horama is the powerful ecosystem where you can have your network information correlated and fully unified. The first Open Source Big Data backend framework that manages, monitors, stores, correlates and unifies the information received from each of the solutions in a useful and simple dashboards. Horama and its apps are the best combination for prevent and fix security weakness of your network.


The redBorder apps

Be your own gatekeeper and prevent attacks into your network

redBorder apps live inside Horama. Imagine if you could view and manage in a single place thousand of events, network traffic or every action that occurs in your network in Real-Time, and also analyze any document or file that you receive. That is redBorder Horama, that is the power.


The sticky menu will be shown here


Manage thousands of events per second and make the best decisions for your business

Internet attacks are becoming more and more sophisticated, which is why it is critical to have a reliable protection system. This solution offers you the choice to detect attacks before they become incidents. Probably the best Open Source IPS system available in the world.



Get absolute visibility

More information means more power, so if you know everything that’s happening in your network you will defend and protect your business. It’s simple: Flow allows you to view traffic in Real-Time so if something alerts you, you can contextualize it. Flow provides the same power to see the traffic in Real-Time and analyze hystorical background.



So nothing catches you unprepared

No one is immune from Malware. This is the most common attack in businesses. Hundreds of attachments are received every day in your email boxes. redBorder Malware analyzes and scans each document or file that would be a potential threat. Jump ahead and avoid any unforeseen event.



Follow the trail, keep the control

Every movement in your network leaves a trace as a fingerprint. You can follow it by monitoring logs through the Horama dashboard and integrate it with redBorder IPS and Flow in order to get the most powerful Open Source Cybersecurity solution you have ever known.


redBorder Appliance

The redBorder appliances

For those willing to exploit redBorder IPS with ease and confidence, we provide our own family of hardware appliances, all of them with LAN Bypass, frontal connectivity and redundant power supplier.



Are you ready for the challenge of absolute visibility? Ok, let’s roll!

The best Big Data technology for your business

redBorder Horama is in essence an Enterprise Service Bus built around Apache Kafka with customizations for Cybersecurity and Network monitoring. Events are received either natively from Kafka or transformed from legacy formats into Kafka, processed in Real-Time in an Apache Storm pipeline and stored in both Metamarket’s Druid for schemaless aggregated interactive online analytics and Hadoop for raw storage. This stack ensures its scalability and flexibility.


George Manuelian, Director SP Mobile SolutionCisco Systems (CA, USA)
"This new platform gives us the opportunity to correlate all the data we are collecting so that we can monetize it through a common API."
Sergio Oropeza, Communications Technology Center ManagerProduban (Santander Bank Group)
"redBorder's open technology has helped us to innovate in our cybersecurity approach, deploy massively in the main countries where we operate and streamline our costs significantly."
Jose Ramón Bazo, General ManagerNextel
"The redBorder proposals helps integrators such as Nextel to complete their offer in the current customer base and open new opportunities through innovative technology, open and scalable."

Product Packages

Choose best options that fits your needs

  •    On Premise
  •    Single-Apps
  •    Multi-Apps
  •    Support
  •    Sofware Upgrates
  •    Hardware Option
  •    Scale-Out
  •    Intelligence
  •    Affero AGLP + Prop


Download a powerful, smart and easy to use cybersecurity and data analytics software.

The team

Mobile World Congress 2014

We are presenting redBorder Horama 3.0 in MWC, the first release of the software based on this new p... Read more

Welcome to redBorder

It is my pleasure to be presenting this first entry to the new redBorder blog and share the new ENEO stage, which we are launching today with you. This will not be a personal blog (it will have the participation of the people from ENEO as well as the... Read more

Opening event

Ven a sevilla y descubre por qué ENEO es la startUp del momento y por qué un gigante de Silicon Valley tiene su proìo catálogo la técnologia redBorder para venderla al mundo. Read more

A Meteorite Called Open Source...

We are living the Cretaceous-Tertiary period all over again and, as in the previous occasion, many experts contradict each other in explaining the reason for the dinosaurs’ disappearance from the face of the earth; whether it was the result of a meteor... Read more

RedBorder -a disruptive startup- participates in Pitch2Market

Today, January 20, Everis Digital organizes a new edition of Pitch2 Market, an event in which 10 startups will present their projects to the managers... Read more

redBorder joins the edge of innovation: Mobile World Congress 2015

We are thrilled to announce that we will be at the Mobile World Congress 2015 this year in beautiful Barcelona... Read more

Calling all redBorder Evangelists!

Are you a member of our community and consider yourself an advocate of redborder? Will you be in Bar... Read more

Why the Mobile World Congress 2015 Has Rocked Our World

The Mobile World Congress (MWC) is like a small city within the city of Barcelona, Spain, with about 100,000 attendees. Read more

redBorder supports Free Software

We have confirmed that we will participate as a main sponsor of the ninth edition of the Free Software University Contest (CUSL-acronym in Spanish). Support this ninth edition of CUSL consolidate our belief that innovation is only possible if knowledge is shared. Read more

Interview with Aurelio Martin, redBorder's BDM who will travel to Barcelona on Tuesday March 24 to attend the Pitch2Market organized by Everis Digital.
Read more

Why is OSINT a key point of a CSIRT?

In order for a cybersecurity team to be able to identify threats, you must access and manage large amounts of information. This information could come from an alarm generated by an IDS, an anomaly in network traffic, or why not, from a "tweet". Discover why OSINT is essential for a CSIRT.
Read more

5 Strategies to Enter Into the Global Market

The startup culture may be romanticized in some parts of the world, with a vision of trendy co-working spaces filled with Apple laptops or hip apps coming out of San Francisco.
Read more

UX and security: in a quest for the optimum balance

Informatics security is an issue that directly affects the user. Loss of control and data leakage must be a priority when dealing with this.
Read more

redBorder officially supports Napatech cards for its IPS product line

Today we are proud to announce the official support within redBorder Horama IPS of Napatech cards. ...
Read more

Why Big Data turns an essential key in a cybersecurity strategy

The need for the availability of certain services offered through the Internet can also be a focus for attacks, as the systems need to prevent, detect and mitigate the damage as soon as possible.
Read more

Processing data streams in Real-time

Understand how the processing and analysis of large streams of information is vital to gain a strategic advantage in the business environment in which we live.
Read more

CUSL support Free Software as bet of future

The 7th and 8th May will be the end of the ninth edition of Free Software University Contest (CUSL- acronym in Spanish). Good luck to all, may the best programmer win!
Read more

Wearables: Why analytics and security go hand in hand

Fitness wearables are not just about wearing a band around your wrist. It’s about effectively using the data that is collected by making sense of it.
Read more

The birth of rBCSIRT: redBorder promote safety

New threats continually appear, and that what was safe at a given time may become vulnerable over time. That is why we at redBorder wanted to create a Computer Security Incident Response Team.
Read more

The importance of anomaly detection and machine learning algorithms in Cybersecurity

Today the detection of attacks and intrusion is an important role in the security of our networks.
Read more

redBorder presents Open Source Cyber Intelligence in Open Expo Day 2015

redBorder will host a workshop, giving a short introduction to Open Source Cyber Intelligence and its importance in cybersecurity policies.
Read more

redBorder Family Album

Here is a little glimpse as to what we've been up to these last 6 months. We look forward to seeing where the next 6 months take us. Would you like to join us on this adventure?
Read more

Cyber threats and CSIRT’s: The battle is about to begin

There is great complexity to respond when facing an incident, it will be necessary to collaborate with third parties.
Read more

The Apache Kafka machinist: intereview with Magnus Edenhill

We are interviewing Magnus Edenhill, the developer of lbrdkafka.
Read more

Interview with Alberto Harriero, a member of the department of Industry and Technology of the Economic and Commercial Office of Spain, in Shanghai.
Read more