Intrusion Detection & Prevention


An Integrated AI driven SaaS Platform to monitor an enterprise for malicious activity or policy violations in terms of Network, Host, Perimeter and VM Based Intrusion Detection Systems


Products / glosys One / glosys CyberSec / IDP




glosys IDS Overview

glosysIDS, a product of glosys CyberSec Platform, provides An Integrated AI driven SaaS Platform to monitor an enterprise for malicious activity or policy violations in terms of Network, Host, Perimeter and VM Based Intrusion Detection Systems

Features We offer

Network intrusion detection system



Deploy Network IDS across infrastructure at specific strategic points such as the subnets most vulnerable to an exploit or attack. Monitor the entire inbound and outbound traffic flowing to and from the network devices. Identify anomalies in network traffic – such as fragmented packets and activity across non-standard ports – to alert network administrators of a potential intrusion, and provide the information required to conduct a thorough investigation

Host-based intrusion detection system



Host-based IDS runs on a host and monitors system activities for signs of suspicious behavior. Examples could be changes to the system Registry, repeated failed login attempts, or installation of a backdoor. Host-based IDSs usually monitor system objects, processes, and regions of memory

Perimeter intrusion detection system



Perimeter security system can protect not only the insides of industrial or business premises, but also the objects and articles of value located within the guarded area to ensure protection against burglary and vandalism in terms of access control measures, surveillance and security testing processes

VM-based intrusion detection system



Design a particular VM that provides intrusion detection services for other VMs. Especially, the rule list can be constructed dynamically for each virtual machine respectively

Meet Your Intrusion Detection System Objectives & Needs