Location:Home > Product Center >Detection of defensive >

Day letter intrusion defense system

       Day letter company independent research and development of intrusion prevention system (hereinafter referred to as TopIDP products) adopts on-line deployment method, can real-time detecting and blocking including overflow attacks, RPC attack, WebCGI attack, denial of service attacks, trojans, worms, system vulnerabilities, such as network attack behavior, IT can effectively protect the user network and service resources. TopIDP products also have application protocol intelligent identification, flow control, network virus defense, Internet behavior management and wireless intrusion prevention function, provides users with a complete integrated network security protection.


Product Detail


       fast

       Fast process performance is a basic requirement for gateway products, especially for processing the application layer data of intrusion prevention product requirements more stringent. TopIDP unique patent product whole series the day melt letter multi-core processing hardware platform, based on advanced SmartAMP parallel processing architecture, built-in processor dynamic load balancing patent technology, combined with the original SecDFA core algorithm faster, realized the high performance of network data flow real-time detection and prevention.


       quasi

       Accurate identification of network attack behavior is the core value of intrusion defense products. TopIDP product USES protocol analysis and pattern matching and abnormal traffic monitoring integrated technology to determine network intrusion behavior, can accurately find and blocking all kinds of network attack. Day melts, alpha laboratory (hereinafter referred to as TopLabs) is the national attack detection unit of vulnerability database establishment, is also a national emergency response support services unit and national fixed-point postdoctoral workstation, professional high-quality technical researchers, through continuous tracking security vulnerabilities of the latest findings, research, analysis, form with independent intellectual property rights of attack detection rules library, make sure TopIDP products have accurate detection. The rule base has passed the certification of international authoritative organizations of CVE compatibility, and keep the update frequency of the at least once a week.

       steady

       Stability is the foundation of intrusion defense products. Products used TopIDP multi-core processing hardware platform and day letter independent intellectual property rights of TOS (Topsec Operating System) System, inherits the day melt letter company for many years to accumulate experience in gateway product technology. TopIDP in government, banking, telecommunications, insurance, electricity industry has a large-scale deployment as an example, has the high stability and high reliability, can steadily under the network environment in all sorts of identifying and blocking all kinds of intrusion behavior, ensure the security of the network business flow.



       all

       Wired and wireless attack defense in the integration of comprehensive fusion TopIDP products are the foundation of construction of BYOD era network border security, effectively prevent hacker intrusion user information system through various channels.





Show