2
www.secpoint.com Highly Sophisticated Intrusion Prevention System The Protector comes fully loaded with a sophisticated intrusion prevention system and zero day protection. The benefit of Intrusion Prevention is that it can block hacker, worm, virus and Denial of Service attacks that target valuable servers. Zero Day Protection for Newly Discovered unpatched Vulnerabilities For maximum defence Zero Day protection adds an extra shield to your network so it can protect against many new or unknown threats before the vulnerability is discovered. This provides true protection from exploits before they can be created and launched against your network. This is of great benefit due to the fact that hackers often use zero day exploits to com- promise a target system. 10,000+ Database Signatures The Intrusion Prevention vulnerability database consists of more than 10 years of research. The Intrusion Prevention database is combined with sophisticated techniques such as zero day protection to ensure the best protection. Built-in Protection from Denial of Service Built-in Protection from Denial of Service Attacks The Protector blocks Denial of Service attacks so that your systems are robust under heavy attacks. Built-in Protection from Unknown Attacks The Protector Intrusion Prevention System can block as yet unknown attacks. This is based on intelligence patterns from the database containing more than 10,000 unique attacks. It is of great benefit in offering protection from unknown specially-created attacks. Protection for Newly Discovered Vulnerabilities where no Patches are Available The Protector Intrusion Prevention System can protect from attacks based on newly dis- covered vulnerabilities and protect you from attacks for which no patch is available. Protection for websites and web shops The Intrusion Prevention System protects from common web attacks such as SQL Injection, Cross Site Scripting, Directory Traversal and Information Disclosure attacks that are commonly used to compromise web shops. Intrusion Prevention System with Zero Day Protection The cost of security breaches, downtime and data loss is unacceptable in this day and age. You need to be sure that your network is fully protected against any form of undesirable Internet traffic it might encounter. Highly Sophisticated Intrusion Prevention System Zero Day Protection 10.000+ Database Signatures Built in Protection from Denial of Service Attacks Built in Protection from Unknown Attacks Protection for Newly Discovered Vulnerabilities where no Patches are Available Protect unpatched servers and workstations Protection for web sites and web shops The Protector Unified Threat Management Unified Threat Management The Protector

Protector intrusion prevention datasheet

Embed Size (px)

Citation preview

Page 1: Protector intrusion prevention datasheet

www.secpoint.com

Highly Sophisticated Intrusion Prevention SystemThe Protector comes fully loaded with a sophisticated intrusion prevention system and zero day protection. The benefit of Intrusion Prevention is that it can block hacker, worm, virus and Denial of Service attacks that target valuable servers.

Zero Day Protection for Newly Discovered unpatched VulnerabilitiesFor maximum defence Zero Day protection adds an extra shield to your network so it can protect against many new or unknown threats before the vulnerability is discovered. This provides true protection from exploits before they can be created and launched against your network.

This is of great benefit due to the fact that hackers often use zero day exploits to com-promise a target system.

10,000+ Database SignaturesThe Intrusion Prevention vulnerability database consists of more than 10 years of research. The Intrusion Prevention database is combined with sophisticated techniques such as zero day protection to ensure the best protection.Built-in Protection from Denial of Service

Built-in Protection from Denial of Service AttacksThe Protector blocks Denial of Service attacks so that your systems are robust under heavy attacks.

Built-in Protection from Unknown AttacksThe Protector Intrusion Prevention System can block as yet unknown attacks. This is based on intelligence patterns from the database containing more than 10,000 unique attacks.It is of great benefit in offering protection from unknown specially-created attacks.

Protection for Newly Discovered Vulnerabilities where no Patches are AvailableThe Protector Intrusion Prevention System can protect from attacks based on newly dis-covered vulnerabilities and protect you from attacks for which no patch is available.

Protection for websites and web shopsThe Intrusion Prevention System protects from common web attacks such as SQL Injection, Cross Site Scripting, Directory Traversal and Information Disclosure attacks that are commonly used to compromise web shops.

Intrusion Prevention System with Zero Day ProtectionThe cost of security breaches, downtime and data loss is unacceptable in this day and age. You need to be sure that your network is fully protected against any form of undesirable Internet traffic it might encounter.√Highly Sophisticated

Intrusion Prevention System

√Zero Day Protection

√10.000+ Database Signatures

√Built in Protection from Denial of Service Attacks

√Built in Protection from Unknown Attacks

√Protection for Newly Discovered Vulnerabilities where no Patches are Available

√Protect unpatched servers and workstations

√Protection for web sites and web shops

The ProtectorUnified Threat Management

Unified Threat ManagementThe Protector

Page 2: Protector intrusion prevention datasheet

Features

Highly Intrusion Prevention System √Comes Fully Loaded with a Highly Sophisticated Intrusion Prevention System √Zero Day protection √Zero Day web exploit protection √Blocks port scans and vulnerabilities scans

Zero Day Protection √Protection for New Vulnerabilities √True protection for exploits before they can be launched

10.000+ Database Signatures√More than 10 years research for creating the database √Divided in categories such as: Web, FTP, Mail, Database, SQL, Backdoors, Netbios, POP2, POP3, IMAP, RPC, SNMP, Telnet, SSH, X11 and more

Build in Protection from Denial of Service Attacks √ Blocks Denial of Service attacks √Blocks Distributed Denial of Service attacks √Blocks traffic from hacked workstations that are used in Denial of Service attacks

Build in Protection from Unknown Attacks √ Blocks unknown attacks that an attacker is constructing √ Blocks modifies known attacks that are con structed to avoid intrusion prevention systems

Protection for Newly Discovered Vulnerabilities where no Patches are Available √Blocks newly discovered vulnerabilities even though patches are not released √ Blocks vulnerabilities for servers and workstations that do not yet have applied existing patches

Protection for Web Sites and Web Shops √Blocks SQL Injection attacks √Blocks Cross Site Scripting attacks √Blocks Directory Traversal attacks √Blocks Information Disclosure attacks √Blocks Remote File Inclusion Attacks

Automatic Update √Automatic daily database updates √Automatic firmware updates with new features and functionality √Centralized update point √Automatic alert when database is expired √Option to upload updates manually via the interface

Scalable and Upgradeable √All units can be upgraded for network growth via a software license √Investment protection

Support and Maintenance √One year database subscription included √30 Days Silver support included √Option for Silver, Gold, Platinum support √Option for instant replacement hardware √Quick setup wizard √Configuration backup/restore √Email alert and logging via syslog

Partner Information

Unified Threat ManagementThe Protector

Internet/Extranet

VALID TRAFFIC Clean Traffic

FIRE

WAL

L

THE PROTECTOR CAN BE PLACED IN FRONT OF OR BEHIND AN EXITING

FIREWALL

Web

Mail

Servers

Intranet

Database

-Hackers-Crackers-Worms-Script Kiddies-Zombie Attacks-Trojans-SQL Injection-Cross Site Scripting-Format String attacks

Databases updated serveral times daily!

www.secpoint.com

The SecPoint® ProtectorIntrusion Prevention with Zero Day Protection

Zero Day Vulner-ability discovered

by an attacker

The attacker creates a zero day

exploit

Public knowledge,

press, vendor

The vendor creates a Patch

The vendorreleases a Patch

The Patch is installed!ATTACK!

-DoS Attacks-DDoS Attacks-Harvesting

Security Risk

SecPoint protection

For more information on SecPoint, please visit www.secpoint.com

Internet: www.secpoint.comE-mail: [email protected]