Firewall
> Network attack detection: Yes
> DoS and DDoS protection: Yes
> TCP reassembly for fragmented packet protection: Yes
> Brute force attack mitigation: Yes
> SYN cookie protection: Yes
> Zone-based IP spoofing: Yes
> Malformed packet protection: Yes
Intrusion Prevention System
> Stateful protocol signatures: Yes
> Attack detection mechanisms: Stateful signatures, protocol anomaly detection (zero-day coverage), application identification
> Attack response mechanisms: Drop connection, close connection, session packet log, session summary, email, custom session
> Attack notification mechanisms: Structured syslog
> Worm protection: Yes
> Simplified installation through recommended policies: Yes
> Trojan protection: Yes
> Spyware/adware/keylogger protection: Yes
> Other malware protection: Yes
> Protection against attack proliferation from infected systems: Yes
> Reconnaissance protection: Yes
> Request and response side attack protection: Yes
> Compound attacks combines stateful signatures and protocol anomalies: Yes
> Create custom attack signatures: Yes
> Access contexts for customization: 500+
> Attack editing (port range, other): Yes
> Stream signatures: No
> Protocol thresholds: Yes
> Stateful protocol signatures: Yes
> Approximate number of attacks covered: 5,500+
> Detailed threat descriptions and remediation/patch info: Yes
> Create and enforce appropriate application-usage policies: Yes
> Attacker and target audit trail and reporting: Yes
> Deployment modes: Inline
Write a review
Your Name:Your Review: Note: HTML is not translated!
Rating: Bad Good
Enter the code in the box below: