Description
Product Slogan: Deep Defense Precise Blocking
SkyQuest Intrusion Prevention System (Intrusion Prevention System) isQixinghen (Chinese company name)Self-developed intrusion prevention networksuretyThe product is based on the core concept of "deep defense and precise blocking", through accurate analysis and judgment of the deep attack behavior in the network, and immediately block the attack behavior after judging it as an attack behavior, so as to proactively and effectively protect the security of the network.
Tianqing Intrusion Prevention System (IPS) integrates Qixing's accumulation and research results in intrusion attack identification, making it reach the international leading level in precise blocking, and can actively block network worms, spyware, Trojan horse software, overflow attacks, database attacks, advanced threat attacks, brute-force cracking, and other deep attacks, making up for the deficiency of the effect of deep defense of other security products. Insufficient.
Product Honors
- CCID report shows Qixingchen IDS/IPS products have been No. 1 in domestic market share for 18 consecutive years
- IDC Report Shows Qisda IDS/IPS Products No. 1 in Domestic Market Share in 2013-2020
- Finalist in Gartner's 2016 and 2017 Magic Quadrant for IDPS (IPS + IDS)
- Gartner's 2018 IDPS Market Guide
- National Next Generation Internet (NGI) Award 2012information securityIntrusion prevention products supported by "special projects
- Beijing Independent Innovation Products
- 2009 Annual Recommended Products of China's Excellent Financial IT Products and Solutions
- 2008 China Information Security Excellent Product Award
- 2007-2008 Successful Company of the Year in China IPS Product Market
- 2007 China Information Security IPS Product Trustworthy Brand Award
Product Features
- High-performance dedicated hardware architecture
- Adopting the new dedicated multi-core hardware platform with Qixingchen's self-developed security operating system, it provides more efficient and stable intrusion defense processing performance, and provides reliable protection for users' online business.
- Leading threat defense capabilities
- A comprehensive attack signature library:Covers common attack types with over 6,000 intrusion attack features
- Powerful intrusion signature customization:Supports more than 25 protocols and hundreds of protocol variables for flexible and scalable defense capabilities.
- anti-WebScanning Module:For Web scanning behavior, algorithm-based identification of CGI scanning, crawlers and vulnerability scanning, etc., and blocking and alerting;
- Brute force password guessing protection:The product is built-in 22 kinds of password exhaustive detection features to identify and prevent violent exhaustive behavior, through the combination of rule-based weak password detection capabilities, to maximize the prevention of security risks caused by weak passwords of customers;
- Advanced Threat Detection and Defense:With static detection of malicious code, support for the use of virtual execution technology and dynamic detection engine analysis, and APT sandbox detection system for linkage, can provide users with a complete APT detection and defense solutions
- IoT Attack Detection and Protection:Based on long-term research on IoT security risks and strong security protection capabilities, fully integrated attack detection capabilities for IoT, built-in 2500+ specialized feature libraries, and through regular upgrades, continue to ensure the safe operation of IoT.
- Original wireless intrusion defense:To make up for the shortcomings of wireless network intrusion defense, the wireless intrusion prevention engine can be specially designed to detect and defend against attacks on 11x wireless networks, which is a perfect match for network layer intrusion defense (optional wireless intrusion prevention engine required).
- Professional attack and defense research and product practice team:Ensure that the intrusion defense first-class response speed, has achieved a number of major, urgent vulnerabilities to take the lead in the protection, you can pay attention to the Sina Blue V certified microblogging".Kaixin event release" for information on the latest security incidents
- Dual-engine efficient virus protection
- Dual virus engines to check and kill file viruses, macro viruses, script viruses, worms, Trojans, malware, grayware, with comprehensive virus database coverage and weekly updates;
- Intrusion prevention with anti-virus loaded at the same time with low performance degradation
- Threat Intelligence Enablement
- Integrated Threat Intelligence: Integration with Venuseye Threat Intelligence Library covering 50 classifications;
- Provide product linkage interface: can be linked with third-party products (including IDS, log analysis, situational awareness), to achieve IP blocking
- Comprehensive application filtering
- Mail Filtering:Precise filtering of emails based on IP, sender/receiver, subject and content;
- webFiltering:Black & White List and Web Malicious Code Filtering.
- Sensitive information protection:Deep protocol and file parsing engine to detect content information and block emails and files containing sensitive information
- Precise resistanceDoSfirepower
- The combination of feature control and anomaly control is used to effectively guarantee the accuracy and comprehensiveness of anti-denial-of-service attacks, blocking the majority of DoS attacks.
- soundP2P,IMStreaming media, online games and stock software control capabilities
- P2PControl:Blocking and speed limiting for Emule, BitTorrent, Maze, Kazaa and more;
- IMControl:Black and white list based IM login control, file transfer blocking, virus checking; supports mainstream IM software such as QQ, MSN, Yahoo!
- Streaming control:Blocking or speed limiting of streaming applications, support Kamun ppfilm , PPLive, PPStream, QQ Live, TVAnts, Boiling Point Internet TV, Catpult Podcasting and so on;
- MMO Control:Blocking of common online games such as World of Warcraft, ZT Online, QQ Game Hall, Lianzhong Game Hall and so on;
- Stock software control:Blocking of commonly used stock software such as Flush, Big Reference and Big Wisdom.
- high reliability
- Highly reliable and secure operating system:Separation and reliability technology based on management level and business level to guarantee network business continuity;
- HA::Supports both master-master and master-standby modes;
- softwareBypass::Supports Bypass for both electrical and optical ports. Bypass is supported by default for all electrical ports to support network availability in the event of device power outages and anomalies;
- hardwarebypassand overload protection:In the event of excessive or abnormal system load due to abnormal network traffic, the system supports the business priority mode (optional) to reduce the system load and guarantee the continuous availability of services.
- Convenient centralized management functions
- Through the centralized management and data analysis center to achieve unified management, real-time monitoring, centralized upgrading and topology display of multiple devices.
Some typical cases
- Financial Data Center Case
- Bank of China, China Postal Savings Bank, People's Insurance Group of China, China Life, Ping An Bank, etc.
Reviews
There are no reviews yet.