Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Intrusion Prevention Systems play a crucial role in identifying and thwarting attempts to exploit vulnerabilities in systems or applications, ensuring that your organization remains safeguarded against emerging threats. With Check Point's IPS integrated into our Next Generation Firewall, updates occur automatically, ensuring protection against both long-standing and newly discovered vulnerabilities. This technology offers a vast array of signature and behavioral preemptive defenses, enhancing your security posture. Our advanced acceleration technologies enable you to activate IPS safely, while a minimal false positive rate allows your team to focus on critical tasks without unnecessary interruptions. By enabling IPS on any Check Point security gateway, you can effectively lower your overall ownership costs. In addition, our on-demand hyperscale threat prevention capabilities provide enterprises with the ability to expand and maintain resilience on-site. Furthermore, we ensure that users can access corporate networks and resources securely and seamlessly, whether they are traveling or working from home. This comprehensive approach not only fortifies your defenses but also enhances overall productivity and operational efficiency.

Description

In the realm of cybersecurity, speed is of the essence, and Intrusion provides you with rapid insights into the most significant threats present in your environment. You can access a live feed of all blocked connections and delve into individual entries for detailed information, including reasons for blocking and the associated risk levels. Additionally, an interactive map allows you to visualize which countries your organization interacts with most frequently. It enables you to quickly identify devices that experience the highest number of malicious connection attempts, allowing for prioritized remediation actions. Any time an IP attempts to connect, it will be visible to you. Intrusion ensures comprehensive, bidirectional traffic monitoring in real time, affording you complete visibility of every connection occurring on your network. No longer do you need to speculate about which connections pose real threats. Drawing on decades of historical IP data and its esteemed position within the global threat landscape, it promptly flags malicious or unidentified connections within your network. This system not only helps mitigate cybersecurity team burnout and alert fatigue but also provides autonomous, continuous network monitoring and round-the-clock protection, ensuring your organization remains secure against evolving threats. With Intrusion, you gain a strategic advantage in safeguarding your digital assets.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ClearPass
CyberArk Machine Identity Security
IBM Cloud
Imvision
Logz.io
ManageEngine Access Manager Plus
Microsoft Azure
Nozomi Networks
RSA eBusiness Solutions
SAASPASS
ServiceNow Asset Management
SolarWinds Access Rights Manager
Stellar Cyber
Symantec Advanced Authentication
Syntegra
Tenable One
Vectra AI
Wind River Helix Virtualization Platform

Integrations

ClearPass
CyberArk Machine Identity Security
IBM Cloud
Imvision
Logz.io
ManageEngine Access Manager Plus
Microsoft Azure
Nozomi Networks
RSA eBusiness Solutions
SAASPASS
ServiceNow Asset Management
SolarWinds Access Rights Manager
Stellar Cyber
Symantec Advanced Authentication
Syntegra
Tenable One
Vectra AI
Wind River Helix Virtualization Platform

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Check Point IPS

Founded

1993

Country

United States

Website

www.checkpoint.com/quantum/intrusion-prevention-system-ips/

Vendor Details

Company Name

Intrusion

Country

United States

Website

www.intrusion.com/products/on-premise-network-protection/

Product Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Alternatives

Alternatives

ExtraHop RevealX Reviews

ExtraHop RevealX

ExtraHop Networks
Check Point Quantum Network Security Reviews

Check Point Quantum Network Security

Check Point Software Technologies
FortiGate NGFW Reviews

FortiGate NGFW

Fortinet
GREYCORTEX Mendel Reviews

GREYCORTEX Mendel

GREYCORTEX