Company profile
1.79 MB |
Click here to download our pdf company profile. |
1.79 MB |
Click here to download our pdf company profile. |
.Internal integrated between network vulnerability and event correlation platform
.Unique approach for detecting intrusion attempts (Vulnerability Based)
.Match existing vulnerabilities with real time intrusion detection alerts
.Reducing the amount of misleading information associated with a traditional IDS
.Based on a highly graphical and intuitive dedicated management dashboard
.Real-time threat data such as spyware, port scans and Trojans, alerting network managers to real and present dangers in time to take remedial action in order to avoid an event escalating into a business critical incident.
.Network intrusion detection alerting and reporting