The Enterasys Intrusion Prevention System (IPS) is unique in its ability to gather evidence of an attacker's activity, remove the attacker's access to the network, and reconfigure the network to resist the attacker's penetration technique. The IPS stops attacks at the source of the threat and can proactively protect against future threats and vulnerabilities. Offering an extensive range of detection capabilities, host-based and network-based deployment options, a portfolio of IPS appliances, and seamless integration with the Enterasys Secure Networks architecture, the IPS utilizes a state-of-the-art high-performance, multi-threaded architecture with virtual sensor technology that scales to protect even the largest enterprise networks.
The Intrusion Prevention System is a core component of the Enterasys Secure Networks architecture. When deployed in combination with Enterasys SIEM and NMS Automated Security Manager (ASM), it facilitates the automatic identification, location, isolation, and remediation of security threats. Enterasys IPS also integrates seamlessly with Enterasys Network Access Control (NAC) for post-connect monitoring of behavior once network access has been granted.
Enterasys advanced in-line Intrusion Prevention is designed to block attackers, mitigate Denial of Service (Dos) attacks, prevent information theft, and ensure the security of Voice over IP (VoIP) communications - while remaining transparent to the network. Built upon the award-winning intrusion prevention technology, Enterasys IPS can alert on the attack, drop the offending packets, terminate the session for TCP and UDP-based attacks, and dynamically establish firewall or Secure Networks policy rules. Enterasys IPS leverages thousands of vulnerability and exploit-based signatures.
GIG Network Sensors are appliances for high-performance data centers. They support 1 Gbps data rates and include two onboard ports plus two dual-port fiber or two dual-port 10/100/1000 copper LAN interfaces.Product Highlights
- Protect networked resources by removing an attacker's ability to continue an attack or to mount an attack
- Real-time dynamic attacker containment limits security incident impact
- Works with multi-vendor enterprise edge switching products
- Protects today's and tomorrow's next generation networks
- Industry-leading intrusion prevention and response
- Leverages your existing infrastructure investments and IT expertise