Enterasys Dragon® Host Sensor and Web Server Intrusion Prevention

Enterasys Dragon® Host Sensor and Web Server Intrusion Prevention

MPN: DSHSS7-WEBIPS
🚚 Select the country of delivery:
Delivery from:
Germany
Updating price ... 📣 Send Price inquiry Не поставляется
Delivery cost & estimated delivery time:
От
days

Where to buy and prices (Advertising *)

On Top
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

Technical specifications

On Top

Technical details

Platform PC
Dragon® Host Sensor and Web Server Intrusion Prevention, Must be purchased with a Host License Scalable, Flexible Host-Based Intrusion Defense

A host-based intrusion defense tool, Dragon Host Sensor prevents web attacks and monitors individual systems running today’s most common operating system for evidence of malicious or suspicious activity in real time.

Dragon Host Sensor may be deployed on a protected host where it uses a variety of techniques to detect attacks and misuse on the system, including analyzing the security event log, checking the integrity of critical configuration files, or checking for kernel level compromises. Dragon Host Sensor may also be deployed on a dedicated analysis system where logs are forwarded and analyzed from most commercial firewalls, routers, switches and other IDS devices.

The Dragon Host Sensor Web Intrusion Pervention System (Web IPS) module averts attacks on web servers running Microsoft IIS and Apache to provide maximum protection while operating with minimal overhead on the system. The web IPS provides threat prevention for a large array of attacks and can terminate individual malicious sessions.

Features & Benefits:

Web Server Intrusion Prevention

- Averts attacks on the most widely used web servers: Microsoft™ IIS and Apache.

File attributes monitoring

- Monitors file attributes such as owner, group.

File integrity checking

- Determines if content has been changed via MD5 hash.

Log file analysis

- Analyzes files or directories against signature policy.

Windows event log analysis

- Monitors Windows event logs for misuse or attack.

Windows registry analysis

- Analyzes Windows registry for attributes that should not be accessed and/or modified.

TCP/UDP service detection

- Monitors for opened TCP and UDP ports for protection against backdoor services.

Kernel monitoring

- Detects suspicious privilege escalations and other signs of kernel-level compromise.

Custom module interface

- Provides an open and easy interface for custom module development.

Customizable through Microsoft’s .Net Framework

- Custom modules can extend functionality using Microsoft’s .Net.
Фотографии

    Password recovery
    To recover your password, please enter in the box below your email address with which you have registered:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    An error has occurred. Please check your e-mail address and try again.
    Ваш новый пароль:

    Name is empty


    Выберите страну доставки

    You have not written a message

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    Your message has been sent!

    Close

    1
    Catalog
    Cancel Close
    Бренды:
      Выберите бренды
        Show more close
          Area search
          Worldwide
          Категории
            Product