NGIPS

Next Generation Intrusion
Prevention System

Applies NSFOCUS Intelligent Detection Technology

Active use of NSFOCUS’ Threat Intelligence Feeds

Monitors using context aware user identification

 

The NSFOCUS Next Generation Intrusion Prevention System (NGIPS) provides advanced multi-stage AI analysis for detection and mitigation of tomorrow and beyond unknown and zero-day advanced persistent threats (APTs).

THE INTELLIGENT DETECTION DIFFERENCE

NSFOCUS goes beyond signature and behavior-based detection, using cutting edge Intelligent Detection advanced intelligence heuristics learning technology for network and application threat detection. NGIPS also combines AI with state-of-the-art threat intelligence to detect malicious sites and botnets.

 

An optional virtual sandboxing capability can be added to the NGIPS system using the NSFOCUS Threat Analysis System. The TAS uses multiple innovative detection engines to identify known and zero-day APTs, including IP reputation engines, anti-virus engines, static and dynamic analysis engines and virtual sandbox execution mimicking live hardware environments.

Features and Benefits

 

Comprehensive Threat Protection

The NSFOCUS NGIPS combines intrusion prevention, threat intelligence and an optional virtual sandboxing capability to effectively address known, unknown, zero-day and advance persistent threats. The NGIPS can discover and block advanced threats by discerning anomalous behaviors such as sensitive data leakage, file identification, and server illegal outreach.

Networking and Security Features Designed to Keep You Online

The NSFOCUS NGIPS integrates traffic prioritization, shaping and DDoS protection to ensure bandwidth is available for your critical users, servers and applications.

Scalable Protection with Industry Leading Price/Performance

Designed for any size organization in a range of cost and performance optimized physical and virtual appliances that scale from 300 Mbps up to 120 Gbps.

Simplified Threat Management

Can be deployed in a high availability configuration and provides advanced network management features including threat visualization based on the attack chain, extensive reporting, user and asset views and more.