Enterasys Dragon® Host Sensor and Web Server Intrusion Prevention 500user(s)

Enterasys Dragon® Host Sensor and Web Server Intrusion Prevention 500user(s)

MPN: DSHSS7-500-LIC
发送方式:
交货来源:
德国
更新价格... 📣 询问价格 Не поставляется
运输成本:
От

凡购买和价格 (Advertising *)

顶部
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

技术特点

顶部

许可证

许可数量 500 user(s)

技术细节

平台 PC
Dragon® Host Sensor and Web Server Intrusion Prevention, 500 Host Licenses Scalable, Flexible Host-Based Intrusion Defense

A host-based intrusion defense tool, Dragon Host Sensor prevents web attacks and monitors individual systems running today’s most common operating system for evidence of malicious or suspicious activity in real time.

Dragon Host Sensor may be deployed on a protected host where it uses a variety of techniques to detect attacks and misuse on the system, including analyzing the security event log, checking the integrity of critical configuration files, or checking for kernel level compromises. Dragon Host Sensor may also be deployed on a dedicated analysis system where logs are forwarded and analyzed from most commercial firewalls, routers, switches and other IDS devices.

The Dragon Host Sensor Web Intrusion Pervention System (Web IPS) module averts attacks on web servers running Microsoft IIS and Apache to provide maximum protection while operating with minimal overhead on the system. The web IPS provides threat prevention for a large array of attacks and can terminate individual malicious sessions.

Features & Benefits:

Web Server Intrusion Prevention

- Averts attacks on the most widely used web servers: Microsoft™ IIS and Apache.

File attributes monitoring

- Monitors file attributes such as owner, group.

File integrity checking

- Determines if content has been changed via MD5 hash.

Log file analysis

- Analyzes files or directories against signature policy.

Windows event log analysis

- Monitors Windows event logs for misuse or attack.

Windows registry analysis

- Analyzes Windows registry for attributes that should not be accessed and/or modified.

TCP/UDP service detection

- Monitors for opened TCP and UDP ports for protection against backdoor services.

Kernel monitoring

- Detects suspicious privilege escalations and other signs of kernel-level compromise.

Custom module interface

- Provides an open and easy interface for custom module development.

Customizable through Microsoft’s .Net Framework

- Custom modules can extend functionality using Microsoft’s .Net.
Фотографии

    密码恢复
    要恢复您的密码,请在下面您的电子邮件地址框与您已注册请输入:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    发生了错误。请检查您的电子邮件地址,然后再试一次。
    Ваш новый пароль:

    名称为空


    Выберите страну доставки

    您还没有写消息

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    已发送您的消息!

    親密

    1
    产品目录
    取消
    Бренды:
      Выберите бренды
        查看更多
          地區搜索
          全球
          Категории
            产品名称