Intrusion Detection

Last Updated on 25 Feb. 2014, Total: 9 Products

Intrusion Detection

  1. nPulse Capture Probe eXtreme (CPX)

    Capture Probe eXtreme (CPX) is an ultrafast, multi-petabyte traffic recording and analysis platform for security operations centers. With lossless packet capture, CPX provides easily searched, indexed storage of network packets, connections, and session data. CPX captures 100% of the traffic, time stamping every packet with nanosecond resolution. CPX streams traffic to disk and generates a multi-key index for rapid search... Read More

  2. Intrusion Detection and Defense System

    Cyberarms IDDS enhances Security by denying access to intruders on the network level. Cyberarms provides a pro-active Intrusion Detection and Defense System (IDDS). It's pro-active, because it not only logs, but also reacts to intrusion attempts. Once a "bad guy" is recognized, he won't have access to any of your systems protected by Cyberarms IDDS. Don't give a second chance... Read More

  3. GFI EventsManager

    GFI EventsManager is an award-winning events monitoring, management and archiving solution, that supports a wide range of event types such as W3C, Windows events, Sylogs and SNMP traps generated by devices such as firewalls, routers and sensors. GFI EventsManager uses event processing and filtering technologies to identify key events out of the box. Advanced event processing rules allow you to... Read More

  4. Intrusion Detection System

    Based on the award-winning Snort® rules-based detection engine, Sourcefire® provides best-in-class network intrusion detection with extensive analytics, powerful reporting, and unrivaled scalability. Through the use of Sourcefire 3D® Sensors and one or more Sourcefire Defense Center® management consoles, Sourcefire IPS deployed as an Intrusion Detection System uses a powerful combination of vulnerability- and anomaly-based inspection methods to detect attacks targeting... Read More

  5. KFSensor

    KFSensor is a Windows based honeypot Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers and worms by simulating vulnerable system services and trojans. By acting as a decoy server it can divert attacks from critical systems and provide a higher level of information than can be achieved by using firewalls and NIDS alone. KFSensor... Read More

  6. Snort

    Snort is an open source network intrusion prevention system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and more. Snort uses a flexible... Read More

  7. CylantSecure for Linux Servers

    The Cylant technology models acceptable system execution patterns and detects precise deviations in real time - before damage and downtime can occur. It adaptively updates the system behavior models based upon continuous system observation and feedback. CylantSecure utilizes an analysis and control process to ensure that your enterprise is protected. Features include: Enable data collection; Model execution behavior; Monitor execution;... Read More

  8. Enterasys Dragon Host Sensor

    A host-based intrusion defense tool, Dragon Host Sensor monitors individual systems and applications, including today's most common operating systems, for evidence of malicious or suspicious activity in real time, and monitors key system logs for evidence of tampering. Dragon Host Sensor may be deployed on a protected host or on a dedicated analysis system where logs are forwarded from switches,... Read More

  9. eTrust Intrusion Detection

    eTrust Intrusion Detection delivers network protection including but not limited to, defense against deployment and execution of Distributed Denial of Service (DDOS) attacks, malicious and unauthorized use of Internet facilities and other network misuse events. Provides realtime, non-intrusive detection, policy-based alerts, ad automatic prevention. Other protective capabilities include enforcing business-use policies through dynamic URL blocking and logging. Fully open and... Read More

Featured Links