button1-blue

button2-blue2

button3-blue2

Enterasys IPS


Enterasys Intrusion Prevention System (IPS) (also known as Dragon® IPS) ensures the confidentiality, integrity, and availability of business critical resources with industry-leading Intrusion Prevention capabilities, including:

  • Threat containment that leverages existing network investments
  • In-line Intrusion Prevention to provide advanced security in a specific location
  • Patented Distributed Intrusion Prevention to automate response to threats in real-time
  • Out-of-band Intrusion Detection that simultaneously utilizes multiple response technologies
  • Forensics tools for session reconstruction to simplify threat mitigation and resolution

Enterasys IPS is unique in its ability to gather evidence of an attacker’s activity, remove the attacker’s access to the network, and reconfigure the network to resist the attacker’s penetration technique. Enterasys IPS stops attacks at the source of the threat and can proactively protect against future threats and vulnerabilities. Enterasys IPS offers an extensive range of detection capabilities, host-based and network-based deployment options, a portfolio of IPS appliances, and seamless integration with the Enterasys Secure Networks™ architecture. Enterasys IPS utilizes a state-of-the-art high-performance, multi-threaded architecture with virtual sensor technology that scales to protect even the largest enterprise networks.

Enterasys IPS is a core component of the Enterasys Secure Networks architecture. When deployed in combination with Enterasys Security Information & Event Manager (SIEM) and Enterasys NMS Automated Security Manager, it facilitates the automatic identification, location, isolation and remediation of security threats. Enterasys IPS integrates seamlessly with Enterasys Network Access Control (NAC) for post-connect monitoring of behavior once network access has been granted.

Extends IPS protection to the network edge
• Protect networked resources by removing an attacker’s ability to continue an attack or to mount a new attack
• Real-time dynamic attacker containment limits security incident impact
• Works with multi-vendor enterprise edge switching products

Protects today’s and tomorrow’s next generation networks
• Protection against emerging Voice over IP vulnerabilities, Day Zero threats, and advanced Denial of Service attacks
• Delivers leading price point and proven effectiveness at Gigabit, Multi-Gigabit, and 10 Gigabit performance
• Flexibly deployed as an appliance and/or virtual appliance enabling cost efficient threat detection and monitoring for both the physical and virtual networks
• Supports inspection and reporting for IPv6 networks extending IPS/IDS capabilities into next generation networks

Industry-leading intrusion prevention and response
• Unmatched threat detection and containment that leverages sophisticated signature, application, protocol, and behavioral analysis
• Unique host-based and network-based protection deployment options
There

Leverages your existing infrastructure investments and IT expertise
• Ready to protect “out-of-the-box” with powerful configuration tools for customization and advanced control
• No fork lift upgrades – works with your existing network switches, routers, wireless access points, and security appliances

Free Consultation

Due to our numerous partnerships, we can provide unbiased opinions on the best solution for your environment.

Unbeatable Prices

Our partnership levels give us the highest product discounts which we pass on as savings to our customers.

Pro Services

Finish your IT projects on-time and under budget with our nation-wide team of senior level engineers.

24x7 Tech Support

Rest assured knowing that our U.S. based IT support team is here for you on nights, weekends and when you need us most.