Network Intrusion Prevention System (NIPS) - Sax2

Sax2 Network Intrusion Prevention

Suggest to a friend

Buy Now Sax2 Network Intrusion Prevention
s    Download Sax2 network Intrusion Prevention

        Ax3soft Sax2 is a professional intrusion detection and prevention system (IDS) used to detect intrusion and attacks, analyze and manage your network which excels at real-time packet capture, 24/7 network monitor, advanced protocol analysis and automatic expert detection.

With insight into all operations in your network, Sax2 makes it easy to isolate and solve your network  security problems - detect network vulnerabilities, identify network security threats,  catch actions against of security strategy and signs of been attacked. Finally, intercept and stop these connections.

Sax2 offers many kinds of intrusion analysis reports, such as events, type, source address and destination address of attacks, and many crossover reports and compositive reports. Furthermore, sax2 allows customize the time range which administrator will flexible monitor and evaluate the network security.

Sax2, enhanced detection, analysis, response and management features, supports almost all common used protocols, self-contained and high speed update event database. It will compose an active detection as the core of dynamic Security Defense System with other network security software, such as Firewall and anti-virus.

Key Features

Intrusion Detection and Prevention

Detects variety of complex attacks in your network, including pre-attack detection, password guessing, denial of service attacks (DoS/DDoS), buffer overflow attacks, CGI/WWW attacks, windows vulnerabilities attacks, Unix vulnerabilities attacks, unauthorized access, SQL inject attacks, worms, backdoor Trojans, ARP spoof, and so on. And then, Sax2 intrusion detection system will initiatively stop the dangerous behavior to prevent your whole network.

Real-Time Alert and Response

Multiple response modes - send console message, logs, e-mail inform, real-time cut off the connection, flexible logs.

Stable performance

Sax2 works in 7/24/365 with stable performance.

Real-time monitor analyze and alarm

Besides real-time monitor network communication, Sax2 also offers analyze and alarm in real time to protect your network security.

Huge data storage

 Sax2 supports many database, such as SQL Server, Access and so on, which let user to store the huge data flexibly.

Plenty reports

With the plenty reports, administrator will easily to monitor attacks and evaluate network security with Sax2.

Customize Security Policy

According to your own network, IT professional may customize the security policy to improve the accuracy of intrusion detection.

 Network Based

Sax2 Intrusion Prevention System is a network-based IDS. It collects, filters, and analyzes traffic that passes through a specific network location. A single Sax2 monitor, strategically placed at a key network junction, can be used to monitor all incoming and outgoing traffic for the entire site. Sax2 does not use or require installation of client software on each individual, networked computer.

Other Features

Name Table

    The name table  allows you to make or edit alias for addresses, ports and protocols, you may also specify the text color for a selected item. This useful feature can make packet-related information familiar and intelligible.

support multi-adapters

       If you have more than one adapters installed on the local machine, Sax2 intrusion detection system can capture the traffic on all the adapters.

In-depth Packet Decoding

        Provides detail packet  decoding information.

Conversation & Packet Stream

        Monitor all conversations and reconstruct packet stream.

Logs of Events

Records the actions and sensitive events in whole network, including the WEB browse, Email transmission, FTP transfers and instant message - MSN to help network administrators identify potential threats.

Who Needs Intrusion Prevention System (IDS) - Sax2?

Want to monitor and prevent hacker attacks, Protect network & business from internal threats!
Wanted to log the websites that your users were visiting.
Needed to monitor corporate communications, both in email messages and on instant messaging platforms.
Wanted a network monitoring solution that did not require client installation at individual workstations.

Articles & How-to's Free Web Directory World Web Directory

Rolex Replique Montre Cheap Replica Watches Rolex replica watches Cheap Rolex Replica Fake Rolex UK cheap iwc replica Cheap Breitling Replica replica watches Swiss Replica Watches Cheap Omega Replica