Intrusion Defender

Monitors network traffic and multiple system processes to identify malicious behavior and reacts in real-time to halt this behavior.

Why do you need Intrusion Defender?

Internet-facing applications and databases are always under threat from highly sophisticated intrusions often these intrusions are attempted through typically trusted sources and allowed protocols and can pass undetected by traditional network firewall security systems. An intrusion can mean significant direct financial loss, customer privacy breaches, brand damage and compliance failure resulting in further financial penalties.

How can it help your business?

Intrusion Defender is an intrusion prevention system that ultimately monitors network traffic and multiple system processes to identify malicious, undesirable or anomalous behavior and reacts in real-time to halt this behavior. Intrusion Defender consists of a centralized management console that correlates threats against the network and sensors that passively aggregate network and user intelligence and take action to block attacks. This solution gives you total network visibility, granular control and intelligent IT security automation. Intrusion Defender specifically protects against threats such as:

  • Worms
  • Trojans
  • Backdoor attacks
  • Spyware
  • Port scans
  • SQL injection
  • Buffer overflow
  • P2P attacks
  • TCP segmentation and IP fragmentation
  • Several blended threats.