Select Page

Sep 27, 2018

Hackers don’t sleep; and neither does Hillstone

by

Breach detection systems focus on malicious activity in a network, therefore they protect entire networks – not isolated endpoints or devices. They can be expensive and also complex, depending on how the network is designed, and as the network expands or changes, so will the solution. Despite the bad rap, the Breach Detection market is said to exceed $1.3 Billion this year per a market intelligence report by NSS Labs. But these characteristics don’t have to be your reality.

Hackers don’t sleep nor rest on their laurels, and neither do we.In the latest release of the Hillstone server Breach Detection System (sBDS), version 2.5, we introduce five new features to augment an already robust feature set. In addition, we are releasing a new model – I3850, which has 5Gbps breach detection throughput.

Highlights:

  • Proactive Detection. Threat hunting can help users detect malicious behavior or abnormal activity during the initial breach stage, so that users can assess the situation at the earliest time for proactive action and protection.
  • Multi-dimensional, deep-level threat display. Intranet security situation monitoring projection gives users an overall assessment of the intranet risk. Users have an intuitive, multi-vectored view of the network status.
  • Threat information shared across admins. Host risk assessment report lets admins fully understand the risk condition based on threat intelligence and abnormal traffic condition of risky servers and computers.
  • Targeted threat related processes. Sysmon endpoint service integration provides more detailed information to the admin of threat related processes beyond threats detected by sBDS. This helps the admin gauge and narrow down the threat impact as well as deal with corresponding risky processes.
  • Larger capacity and simpler configuration. Monitored server number allows for both I-2850 and I-3850 to double in capacity. It can also support batch configuration of servers based on IP mask and IP address segments, simplifying user configuration.