Blocks security threats by detecting code that uploaded to web server and detecting applied modifications to web server
Our thousands of clients trust us to protect their web servers
• Resource usage adjustment of the settings server (CPU, less than 1% use, memory)
• Redundancy support (Active/Active)
• Attacker’s IP identification
• One-Click auto quarantine and report
• Automatic detection of target directory
• Auto-detection of new target directories during operation
Java 1.5 or newer; compatible with all OS (Windows, Linux, Unix)
• Automatic pattern detection agent update
• Automatic backup of latest detections to management server
• Unauthorized extension filter
Detailed management of hierarchy and access rights (manager/control worker/operation worker)
Linkable to external systems
• SYSLOG, SMTP, API, etc.
• ESM, SIEM, configuration management, SMS, EMAIL, etc.