Network & Security > IPS (Intrution Prevenion System) solution
IPS (Intrution Prevenion System) solution


Overview
The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI)
Objective
- To respond to recognized signatures as it captures and analyzes network traffic
- To detect, classify, and stop threats including worms, spyware and adware, network viruses, and application abuse.
- To monitors and performs real-time analysis of network traffic
- To terminate the specific connection, permanently block the attacking host, log the incident, and send an alert to the manager.

Objective
- To respond to recognized signatures as it captures and analyzes network traffic
- To detect, classify, and stop threats including worms, spyware and adware, network viruses, and application abuse.
- To monitors and performs real-time analysis of network traffic
- To terminate the specific connection, permanently block the attacking host, log the incident, and send an alert to the manager.

Benefits
- Monitor and evaluate threats
- Prevent DoS/DDoS attacks
- Maintain the privacy of users as IPS
- Stop attacks on the SSL protocol
- Detect and foil OS fingerprinting
Powered by Technology Ecosystems

