|Dragon Host Sensor and Web server Intrusion Prevention |
Scalable, flexible host-based intrusion detection
A host-based intrusion detection tool, Dragon Host Sensor monitors individual systems and applications - including todays most common operating systems - for evidence of malicious or suspicious activity in real time, and monitors key system logs for evidence of tampering. Dragon Host Sensor may be deployed on a protected host or on a dedicated analysis system where logs are forwarded and aggregated via SNMP or syslog.
DHS uses a variety of techniques to detect attacks & misuse on a protected system, including analyzing the security event log, checking the integrity of critical configuration files, or checking for kernel level backdoors. This hybrid approach ensures that no misuse goes undetected.
Centrally managed via Dragon Enterprise Management Server, Dragon Host Sensor also reports all information - including event description, source/destination IP, source/destination port, raw log (if applicable) and time stamp - to the Security Information Management functionality within Dragon Management server for forensic and trend analysis.
For complete product details, including specs Click Here.