+
+

Related Products

  • Auth0
    1,003 Ratings
    Visit Website
  • Blumira
    146 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • cside
    24 Ratings
    Visit Website
  • Declarative Webhooks
    3 Ratings
    Visit Website
  • Site24x7
    907 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website

About

Based on the full-flow image and big data processing technology, the IDS can analyze the flow log authorized by the user, via a bypass. Also, it can identify the web application attack quickly and profoundly mines the remote command execution, web shell backdoor, and sensitive file leakage attacks against the web by hackers, and make the alarm accurately. Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection compliance services. Under the user authorization, IDS analyzes the bidirectional HTTP traffic log of user EIP in a real-time manner and quickly identifies various common web attacks, such as SQL injection, XSS cross-site scripting, web shell back door uploading and unauthorized access.

About

Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams searching for a platform to perform bypass intrusion detection in the cloud

Audience

IT Professionals and Network Professionals in need of an advanced Intrusion Detection and Prevention solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Baidu AI Cloud
Founded: 2000
China
intl.cloud.baidu.com/product/ids.html

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/intrusion-prevention-system/

Alternatives

Alternatives

Venusense IPS

Venusense IPS

Venusense

Categories

Categories

Integrations

CYREBRO
Nexpose
Rackspace OpenStack

Integrations

CYREBRO
Nexpose
Rackspace OpenStack
Claim Baidu AI Cloud Intrustion Detection System and update features and information
Claim Baidu AI Cloud Intrustion Detection System and update features and information
Claim Trellix Intrusion Prevention System and update features and information
Claim Trellix Intrusion Prevention System and update features and information