|
|
|
|
IPS Signature |
|
Intrusion prevention signatures protect users from being attacked by hackers through unknown vulnerabilities against software operating systems or other applications. |
|
|
Stream-based signature. |
|
Over 3,000 signatures. |
|
Protect various platforms. |
|
Minimal resources and footprint. |
|
Focus on network threats. Including:
- 0-day exploits
- Web attacks(CGI, XSS, SQL Injection, RFI...)
- Worm
- Botnet, Backdoor and Trojan Command and Control (C&C) channel
- Denial-of-Service
- Vulnerability scan attacks
|
|
|
|
|
|
|
|
|
|
|
Copyright © AegisLab. All rights reserved.
Add. 1F.-C6,No.1,Lising 1st Rd.,Science-Based Industrial Park, Hsinchu City 30078,Taiwan Tel. 886-3-5789399 Fax. 886-3-5789595
|
|
|
|
|