Location:Home > Product Center >Detection of defensive >

Day letter intrusion detection system


       Day letter company independent research and development of intrusion detection system (hereinafter referred to as TopSentry products) adopts bypass deployment method, can real-time detection including overflow attacks, RPC attack, WebCGI attack, denial of service attacks, trojans, worms, system vulnerabilities such as network attacks. TopSentry products also has intelligent recognition application protocols, network virus detection, monitoring and wireless Internet behavior intrusion prevention, and other functions, to provide users with a complete integrated network security monitoring.


Product Detail


       fast


       Fast process performance is a basic requirement for gateway products, especially for processing the application layer data of intrusion detection product requirements more stringent. TopSentry unique patent product whole series the day melt letter multi-core processing hardware platform, based on advanced SmartAMP parallel processing architecture, built-in processor dynamic load balancing patent technology, combined with the original SecDFA core algorithm faster, realized the high performance of network data flow real-time detection.


       quasi

       Accurate identification of network attack behavior is the core value of intrusion detection products. TopSentry product USES protocol analysis and pattern matching and abnormal traffic monitoring integrated technology to determine network intrusion behavior, can accurately find all kinds of network attack. Day melts, alpha laboratory (hereinafter referred to as TopLabs) is the national attack detection unit of vulnerability database establishment, is also a national emergency response support services unit and national fixed-point postdoctoral workstation, professional high-quality technical researchers, through continuous tracking security vulnerabilities of the latest findings, research, analysis, form with independent intellectual property rights of attack detection rules library, make sure TopSentry products have accurate detection. The rule base has passed the certification of international authoritative organizations of CVE compatibility, and keep the update frequency of the at least once a week.


       steady

       Stability is the foundation of the intrusion detection products. TopSentry product USES multi-core processing hardware platform and day letter independent intellectual property rights of TOS (Topsec Operating System) System, inherits the day melt letter company for many years to accumulate experience in gateway product technology. TopSentry in government, banking, telecommunications, insurance, electricity industry has a large-scale deployment as an example, has the high stability and high reliability, can be in various steady identify intrusion behavior under the network environment, ensure the security of the network business flow.

       all

       Wired and wireless attack detection in the integration of comprehensive fusion TopSentry products are the foundation of construction of BYOD era network border security, effectively monitoring the hacker intrusion user information system through various channels.




Show