Protects High-Value Mission Critical Servers

The Hillstone Server Breach Detection System (sBDS) adopts multiple threat detection technologies that include both traditional signature-based technology as well as large-scale threat intelligent data modeling and user behavioral analytics modeling, which provides an ideal solution to detect unknown or 0-day threat attacks, to protect high-value, critical servers and their sensitive data from being leaked or stolen. Together with deep threat hunting analysis capabilities and visibility, Hillstone sBDS provides security admins the effective means to detect IOCs (Indicators of Compromise) events, restore the threat attack kill chain and provide extensive visibility into threat intelligence analysis and mitigations.

Hillstone Networks Recognized in Gartner 2020 Market Guide for Network Detection and Response for its sBDS Solution.

Download the report now

Comprehensive Threat Correlation Analytics for Advanced Threat Detection

Hillstone’s threat correlation platform analyzes the details of the relationships of each individual suspicious threat event as well as other contextual information within the network, to connect the dots and provide accurate and effective malware and attack detection with high confidence levels.

Real-Time Threat Monitoring for Critical Servers and Hosts

The Hillstone sBDS platform focuses on protecting critical servers within the intranet, detecting unknown and near 0-day threat attacks and finding abnormal network and application level activities of server and host machines.

Complete Indicator of Compromises and Cyber Kill Chain

Hillstone sBDS drills down and surfaces more threat analysis and intelligence on these IOC events, reconstructing the attack chain based on these IOCs and correlating other threat events associated with these IOCs within time and space spectrums.

Rich Forensic Information and Preemptive Mitigation

The Hillstone sBDS platform conducts threat mitigation with conjunction of Hillstone E-Series NGFW and T-Series iNGFW devices, which are positioned at the network perimeter.

Resources