Products

SENTRY DEFENSE

The Sentry Defense platform offers real time intrusion detection , inline intrusion prevention and network security monitoring.

How Does It Work?

The three IDS detection methodologies which Sentry Defense used to detect incidents are:

  • – Signature-Based Detection compares signatures against observed events to identify possible incidents. This is the simplest detection method because it compares only the current unit of activity (such as a packet or a log entry, to a list of signatures) using string comparison operations.
  • – Anomaly-Based Detection compares definitions of what is considered normal activity with observed events in order to identify significant deviations. This detection method can be very effective at spotting previously unknown threats.
  • – Stateful Protocol Analysis compares predetermined profiles of generally accepted definitions for benign protocol activity for each protocol state against observed events in order to identify deviations.

What Can You Do with Sentry Defense?

Sentry Defense’s Intrusion detection systems (IDS) and intrusion prevention systems (IPS) constantly watch your network, identifying possible incidents and logging information about them, stopping the incidents, and reporting them to security administrators.

In addition, some networks use IDS/IPS for identifying problems with security policies and deterring individuals from violating security policies. IDS/IPS have become a necessary addition to the security infrastructure of most organizations, precisely because they can stop attackers while they are gathering information about your network.

Benefits of Sentry Defense

The information provided by the Sentry Defense System  will help to uncover:

    • – Security policy violations, such as systems or users who are running applications against policy.
    • – Infections, such as viruses or Trojan horses that have partial or full control of internal systems, using them to spread infection and attack other systems.
    • – Information leakage, such as running spyware and key loggers, as well as accidental information leakage by valid users.
    • – Configuration errors, such as applications or systems with incorrect security settings or performance-killing network misconfiguration, as well as misconfigured firewalls where the rule set does not match policy.
    • – Unauthorized clients and servers including network-threatening server applications such as DHCP or DNS service, along with unauthorized applications such as network scanning tools or unsecured remote desktop.

 

 

Please contact us to discuss your Cybersecurity needs: