Related Products
|
||||||
About
Hillstone CloudView is a cloud-based security management and analytics platform that provides SaaS security services across the Hillstone Next-Generation Firewalls (NGFW), I-Series Network Intrusion Prevention System (NIPS) and Hillstone Virtual NGFW CloudEdge. The Hillstone CloudView service empowers security administrators to take swift action with real-time centralized monitoring of multiple devices, traffic and threat analytics, real-time alarms, as well as comprehensive reporting, and log retention. With 24/7 mobile and web access from anywhere on any device, it delivers optimal customer experience along with optimized security management and operational efficiencies. With a global view of the threat landscape, and the details of threat events analysis and monitoring, customers can easily monitor the network health, and get notified of any abnormal behavior or attacks targeted on their network, in order to take prompt action to mitigate the threat.
|
About
Organizations face a barrage of attacks by threat actors driven by a variety of motives, including profit, ideology/hacktivism, or even organizational discontent. Attackers’ tactics continue to evolve, and traditional IPS solutions have not been able to keep pace and effectively protect organizations. To prevent intrusions, malware and command-and-control at each stage of its lifecycle and shut down advanced threats, Threat Prevention accelerates the security capabilities of our next-generation firewalls, protecting the network from advanced threats by identifying and scanning all traffic, applications, users, and content, across all ports and protocols. Daily threat intelligence is automatically curated, delivered to the NGFW and implemented by Threat Prevention to stop all threats. Reduce resources, complexity and latency by automatically blocking known malware, vulnerability exploits, and C2 using existing hardware and security teams.
|
About
Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Organizations seeking a solution to manage and optimize their cloud-based security operations
|
Audience
Organizations interested in a cyber security solution to prevent all known threats across all traffic in a single pass
|
Audience
IT Professionals and Network Professionals in need of an advanced Intrusion Detection and Prevention solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationHillstone
Founded: 2006
United States
www.hillstonenet.com/products/network-security-management/cloud-security-management/
|
Company InformationPalo Alto Networks
Founded: 2005
United States
www.paloaltonetworks.com/products/secure-the-network/subscriptions/threat-prevention
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/intrusion-prevention-system/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Integrations
Acceptto Zero Trust Identity (CIAM)
AllSecureX
Dropzone AI
F5 BIG-IP SSL Orchestrator
Frenos
GTT Envision
Google Digital Risk Protection
IBM Cloud
Kroll Cyber Risk
LONI
|
Integrations
Acceptto Zero Trust Identity (CIAM)
AllSecureX
Dropzone AI
F5 BIG-IP SSL Orchestrator
Frenos
GTT Envision
Google Digital Risk Protection
IBM Cloud
Kroll Cyber Risk
LONI
|
Integrations
Acceptto Zero Trust Identity (CIAM)
AllSecureX
Dropzone AI
F5 BIG-IP SSL Orchestrator
Frenos
GTT Envision
Google Digital Risk Protection
IBM Cloud
Kroll Cyber Risk
LONI
|
||||
|
|
|
|