Hillstone Networks has long been known to specialize in cybersecurity from a network perspective. In fact, our focus on NDR has historically been prominent and recognized by top research firms, such as Gartner’s NDR report. Today, Hillstone Networks is pleased to announce the release of Server Breach Detection System (sBDS) version 3.4. In this release, sBDS extends its detection capability to cover a larger breadth and variety of threats for your high value databases and servers.
Last month, we announced the global release of Hillstone’s XDR solution – iSource. Hillstone Network’s sBDS, or server breach detection system, is one of the vital pieces in bolstering iSource’s effectiveness. This is because the sBDS gives unprecedented visibility into an enterprise’s critical servers and databases. As you can imagine, even siloed information on critical servers would be crucial when determining remediation steps.
sBDS V3.4 comes with a few new updates that bolster its protection of critical servers and databases. To begin, sBDS V3.4 now provides new detection methods for web-based threats, allowing it to detect OWASP top 10 threats. This is important, because more than ever, enterprises are running their critical operations through web-based servers, which will be vulnerable to web-based attacks. Our sBDS in general focuses on defending critical servers and databases, and it’ll now add critical web-based protection for these entities as well.
Brute force attacks are still highly relevant, especially since high standards of password creation are not always being ensured. As such, we’ve imbued sBDS V3.4 with weak password detection capabilities, allowing it to mitigate the threat of brute force attacks.
As attackers have become more aware of signature-based detection, complex methods of masking an IP address have been created. The X-Forwarded-For function can obtain the source IP, effectively cancelling out IP masking techniques. Having this capability allows for the bolstering of access prevention and detection.
By adding the sBDS to your infrastructure protection scheme, you will gain valuable insight into your critical servers and databases. This information can later be integrated into a central management center, such as iSource, to create a cohesive overall report on your security infrastructure status, with a focus on your most critical assets.