System that monitor network or system activities for malicious activity or policy violations. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, report it and attempt to block or stop it.
Includes security for malicious software and spam protection, through use of reputation database and content analysis. Allows to use e-mail encryption and electronic signature. Ability to work with public mail services.
Secure virtualization environments (Hypervisor). Protection of data flows within the virtual network (SDN). Integrating security systems with public clouds (MS Azure, AWS)
Protect mobile devices from malware, encryption and data loss prevention, secure access to corporate network.
Anti-virus protection - one of the main instruments of information security. Using real-time virus signatures and anomaly-based protections.
Allowing unified enforcement and management of all aspects of Web security. Control and monitoring of the use of network applications.
System automates and orchestrates network security policy management on security appliance and network hardware. And also increases efficiency.
Protecting infrastructure in environments, that can be harsh and systems often use specialized protocols. This solution provide advanced threat prevention and comprehensive protocol support to ensure vital assets such as power generation facilities, water treatment systems and factories.
System prevents infections from zero-day threats, new malware and targeted attacks.
Uses heuristic analysis technology, SandBoxing - monitoring activities in an emulated environment and code analysis.
Defensive responses to denial-of-service attacks typically involve the use of a combination of attack detection, traffic classification and response tools, aiming to block traffic that they identify as illegitimate and allow traffic that they identify as legitimate