Features | ✔️ Threat Detection & Blocking -Over 6,000 built-in signatures -Custom signature support -Up to 128 Security Zones -IPS policy, statistics, logs, and monitoring per Security Zone -Full support for Snort options -PCRE (Perl-Compatible Regular Expressions) support -PCRE detection acceleration -YARA-based malware detection -Signature extraction under heavy load -Static MAC protection -5-tuple based IP control -IP control by country or region -Blocking of abnormal protocols (e.g., HTTP, DNS, SIP) -Behavior-based detection -Dynamic/Static QoS -Session management based on 5-tuple -Automatic pattern extraction based on traffic -Category-based URL filtering -Malicious URL filtering -DNS query-based URL filtering -IP fragment attack prevention TCP segment reassembly attack prevention Real IP extraction from X-Forwarded-For headers SSL inspection Detection and blocking of C&C server access via cloud intelligence Policy exception support per feature Control over 1,600+ applications Granular control per application Help documentation per application ✔️ Threat Response Features -Packet Detection and Blocking -Isolation Based on 5-Tuple -Web Block Page Delivery -Vulnerability-Based Attack Prevention -Network-Based Attack Blocking -Malicious Behavior Control -Blocking of Malware Distribution and Relay Sites ✔️ Information Visibility -Integrated Dashboard -Customizable Dashboards and Widgets -Real-Time Threat Detection and Blocking Monitoring -Real-Time Traffic Monitoring -Real-Time Session Monitoring -Comprehensive Log and Statistical Data -Flexible Drill-Down for In-Depth Threat Analysis -User-Defined Statistical Rules -Custom Report Generation ✔️ Network Configuration -Inline Mode (IPS) -Mirror Mode (IDS) -SPAN Mode (IDS, AFNIC only) -Redundant Configuration (Active-Active, Active-Standby) -HA Packet Divert Function ✔️ Security Infrastructure -Cloud-Based Threat Intelligence Collection and Analysis System -MAPP Partnership -Reliable Signature Updates via CDN Infrastructure -Proven Emergency Response System and Dedicated Teams |
Key_Features | ✔️ Enhanced Detection & Blocking Performance Thanks to a multi-core CPU, AhnLab’s proprietary optimization techniques, high-speed packet processing architecture, and PCRE acceleration technology, AhnLab AIPS can detect and block high-volume traffic without service disruption or packet loss. Additionally, support for AFNIC (AhnLab FPGA NIC) further enhances overall performance. ✔️ Multiple Detection Engines for Advanced Threat Response As network environments evolve, malware-based attacks are increasing alongside traditional traffic-based threats. AhnLab AIPS leverages advanced detection engines and next-generation IPS capabilities, along with integration with other security solutions, to effectively counter sophisticated and emerging network security threats. ✔️ Superior Visibility and Ease of Use AhnLab AIPS offers powerful visibility features that enable users to quickly and easily understand the network status and analyze potential threats. Administrators can build customized dashboards using user-defined widgets to focus only on the information they need. For ongoing monitoring and analysis, the system supports the creation of custom statistical and analytical rules tailored to specific threat events. ✔️ Comprehensive Protection and Operational Ease AhnLab AIPS effectively detects and blocks not only attacks targeting network, OS, web, and application vulnerabilities, but also a wide range of network-based threats and malware-driven intrusions. It ensures the security of your business environment against evolving network threats while providing an intuitive and user-friendly management experience. In addition, its outstanding performance guarantees the availability of both your network and services. ✔️ High-Performance Search & Advanced Threat Analytics AhnLab AIPS is equipped with a high-performance engine optimized for big data processing, enabling lightning-fast log and event searches. It also supports diverse and flexible statistical analysis of a vast number of detected events, empowering in-depth threat visibility and response. |
kis@kis.co.kr | |
homepage | http://www.kis.co.kr/kor/business/sub_01_2.html |