An Intrusion Prevention System (IPS) is a threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. An IPS provides a complementary, but essential layer of analysis that negatively selects for dangerous content. As threats to organizational information and integrity are more abundant and insidious than ever, intrusion prevention systems act as foundational controls for in-depth defense against identified attacks – while ensuring the flow of legitimate traffic for continued business operation.
CyberShelter’s Intrusion Prevention System combines industry-leading IPS protection with breakthrough performance for complete and proactive intrusion prevention. Backed by integrated threat intelligence for the latest attack signature support, our Intrusion Prevention System offers the most advanced technology at your network choke points. Deployed as an out-of-band detection and inline prevention solution, the system provides visibility and active protection at the network perimeter and at key entry and exit points of the network. It protects against network and application-level attacks, malware, Trojans, DoS and DDoS attacks, malicious code transmission, backdoor activity and blended threats. Intelligent workflows save time by isolating threat patterns, enabling security administrators to provide fast and accurate responses to network threats and breaches, minimize alert noise, and focus on winning back the network.
Protection against threats, both known and unknown
Built around a cutting-edge hardware platform that scales to multi-gigabit speeds, CyberShelter’s Intrusion Prevention System incorporates a high-speed pattern matching engine that does multi-layered, 2-tier inspection for maximum performance with thousands of protections enabled. The system is constantly updated with new defenses against emerging threats. Many of the IPS protections are pre-emptive, providing robust protection before vulnerabilities are discovered or exploits are even created. The insightful user interface enables configurable, actionable monitoring – letting you track events through detailed reports and logs of what is most important. Customizable reports and multi-dimensional sorting provide easy monitoring of critical security events associated with your business-critical systems.
The combination of known and unknown threat prevention, including protection against zero-day attacks, plus tight integration with other CyberShelter security technologies, enables CyberShelter’s Intrusion Prevention System to stop attacks and enable granular application control regardless of whether your network is wired or wireless, a partner extranet, or connected to a branch office. Our experts provide carefully tuned monitoring and oversight, and help you to establish a new level of integrated, simplified security.