What are you looking for?

Attack Defense Sensor by Medialine

We keep an eye on your security status

Customers are often dissatisfied with their network IDS/IPS and NG firewalls due to the overwhelming number of false positives and their inability to notify them when an actual breach occurs. But why is that? Standard IDS/IPS signatures are designed to detect exploits against known vulnerabilities in systems on the network. This is where our ADS comes into play. An Attack Defense Sensor is used to detect and report threats or attacks on a network or computer. It monitors network traffic for signs of attacks and sends an alert when it detects something suspicious. This way, we always keep an eye on your security status and can quickly respond to threats. The ADS has more than 40 different categories including:

  • Malware commands and control

  • Credential phishing

  • DDoS, botnets

  • Network anomalies

  • Exploits

  • Vulnerabilities

  • Exploit kit activity

This rule set is updated daily. Therefore, the ADS provides unmatched network-based detection logic to identify malware command and control communication, known malicious destination sites, botnets, communication with drive-by sites, and other advanced threats. This includes all major malware families covered by command and control channel and protocol.

Benefits - Attack Defense Sensor

Real-time

Our system detects and reports threats or attacks in real-time, enabling a quick response.

Cost savings

The Attack Defense Sensor prevents damage to hardware or software, data loss, and downtime, resulting in cost savings.

Security

The Attack Defense Sensor enhances overall network security and IT services

Introduction of the Security Dashboard

In the Security Dashboard, you will be shown, among other things:

  • Total number of filtered events

  • Critical alarms

  • Locations of critical alarms

Customer reports

The customer reports will be provided to you monthly. However, with the dashboard, you always have the option to access and review the contents at any time.

Contents

Critical alarms by category

We show you which critical alarms occurred in which category and with which src_ip and dest_ip.

Worldmap

With the world map, you can see at a glance where the events filtered by us have occurred.

IT compliance violations

The attached table gives you an overview of the compliance violations in your organization. The report also includes the src_ip and dest_ip so you can see where the compliance violation occurred.

Contact

Are you interested in our Attack Defence Sensor? Please feel free to contact us. 

Contact us!

All important info at a glance
Via phone
+49 (6751) 85378-0
Via e-mail
Online request
Service Helpdesk
Support area
Login for customers
Check cloud status