Everyday companies receive millions of virtual-attacks, which most of the time results in critical security breach and generate loss to your company, in addition, great damage to your business reputation.

Technological environments are constantly under attack regardless its size. Due the continuous growth of virtual threats and the complexity of protection methods against these attacks, Aker Security Solutions has developed Aker IPS; a complete solution for detection and prevention of intrusions to assist protecting the integrity of your network.

Aker IPS is an Information Security Integrated solution focused on IDS/IPS and Application Filtering, which has the capacity of integrate itself in a single device and perform traffic inspection on passive/active mode, and perform application filtering.

Aker IPS allows users to detect, identify, and perform preventive actions against virtual-threats stopping them from damaging your network, exploiting security breaches, violating sensitive data, and more.

Features

Find out what your business will gain by acquiring Aker IPS

PASSIVE AND ACTIVE MODE for IDS and IPS

It allows the analysis of network traffic according to the rules defined by the user by performing various actions based on them.

SIGNATURE UPDATE

Receive automatic updates of attack signatures by daily/hourly schedule.

EXCLUSIVE DOWNLOAD OF NEW UPDATES

Download only new signatures updates, instead of downloading the entire database, thus, you save on Internet link consumption.

APPLICATION BLOCKING

Aker IPS can inspect and block, in real time, applications and file transfers such as P2P (peer to peer), as Kazaa and IM (Instant Messaging).

DOWNLOADS BLOCKING

Aker IPS monitors and blocks download of specific file types via FTP and HTTP.

IDENTIFICATION OF WEB TRAFFIC

Web traffic is identified and classified according to applications/sub-applications going through the network, such as Social Networking and Communication Tools.

IP SPOOFING PROTECTION

Aker IPS provides a mechanism against IP Spoofing attacks.

Protect your business against:
  • Worms
  • Backdoors
  • DoS
  • Attacks on VoIP communications
  • Zero-day attacks
  • Invalid protocol headers
  • Trojan
  • Portscans
  • Spyware
  • Buffer overflow
  • Malformed traffic
Benefits
  • Enables the adoption of preventive strategies, preventing loss to your business
  • Detects and blocks over 3,500 signatures of application
  • Features dedicated hardware with multiple processors
  • Quick enabling and disabling of rules
  • Allows the creation of White Lists
  • Provides over 20,000 types of virtual-attacks signatures
  • Provides detailed internal reports
  • Allow creating new rules / signatures without traffic interruption
  • Enables its management through an intuitive and secure remote interface
Related Products