Real-time
Our system detects and reports threats or attacks in real-time, enabling a quick response.
Customers are often dissatisfied with their network IDS/IPS and NG firewalls due to the overwhelming number of false positives and their inability to notify them when an actual breach occurs. But why is that? Standard IDS/IPS signatures are designed to detect exploits against known vulnerabilities in systems on the network. This is where our ADS comes into play. An Attack Defense Sensor is used to detect and report threats or attacks on a network or computer. It monitors network traffic for signs of attacks and sends an alert when it detects something suspicious. This way, we always keep an eye on your security status and can quickly respond to threats. The ADS has more than 40 different categories including:
Malware commands and control
Credential phishing
DDoS, botnets
Network anomalies
Exploits
Vulnerabilities
Exploit kit activity
This rule set is updated daily. Therefore, the ADS provides unmatched network-based detection logic to identify malware command and control communication, known malicious destination sites, botnets, communication with drive-by sites, and other advanced threats. This includes all major malware families covered by command and control channel and protocol.
Our system detects and reports threats or attacks in real-time, enabling a quick response.
The Attack Defense Sensor prevents damage to hardware or software, data loss, and downtime, resulting in cost savings.
The Attack Defense Sensor enhances overall network security and IT services
Total number of filtered events
Critical alarms
Locations of critical alarms
The customer reports will be provided to you monthly. However, with the dashboard, you always have the option to access and review the contents at any time.
We show you which critical alarms occurred in which category and with which src_ip and dest_ip.
With the world map, you can see at a glance where the events filtered by us have occurred.
The attached table gives you an overview of the compliance violations in your organization. The report also includes the src_ip and dest_ip so you can see where the compliance violation occurred.
Are you interested in our Attack Defence Sensor? Please feel free to contact us.