- Protocol anomaly behavioral analysis methods in addition to signature based detection
- Stateful monitoring
- Intrusion detection and packet monitoring abilities on the IP Networks
- Recording in different formats during packet monitoring
- Protocol analysis, content search and attack detection capabilities
- Portscan detection
- Real-time intrusion detection
- Reporting into different types of targets and applications
- Automated updates on the rule base
- Over 5000 Intrusion signatures and rules
- Flexibility to add new rules to the rule base
- Integration with the third party products (Ex: with firewalls for prevention )
- Ability to work on more than one CPU platform or operating system
SECURITY SCANNER & VULNERABILITY ASSESSMENT (SS/VA)
- Vulnerability assessment in TCP based devices
- Client-Server Architecture
- Facility to detect services on nonstandard ports by smart service recognition feature
- Ability to test according to the properties of the system for which the security scanning will take place.
- SSL service scan support
- Scheduled background scanning
- Flexibility to allow to add new security tests by the user, using the Plugin support
- Reporting in several number of formats
- Determining the level of risk in reports
- Continuously updated rule base
- Over 7000 vulnerability signatures
- “Easy to add rule” property by its scripting language
- Integration with the third party products
- Ability to work on more than one CPU platform or operating system
Comments are closed.