Technological complexes, meant for network threats, attacks and abnormalities detection.
For intrusion detection a complex method of traffic analysis is used: signatures, network behavior analysis, rules. IPS systems quickly respond to zero-day threats, targeted attacks, viruses spreading etc. IPS systems are equipped with effective tools for building a network operation policy: application and network environment control, network resources auditing and flexible administrators alert system.
Check Point Software Technologies
Hewlett Packard Enterprise
all elements: 9
all elements: 2