glosys IDS Overview
glosysIDS, a product of glosys CyberSec Platform, provides An Integrated AI driven SaaS Platform to monitor an enterprise for malicious activity or policy violations in terms of Network, Host, Perimeter and VM Based Intrusion Detection Systems
Features We offer
Network intrusion detection system
Deploy Network IDS across infrastructure at specific strategic points such as the subnets most vulnerable to an exploit or attack. Monitor the entire inbound and outbound traffic flowing to and from the network devices. Identify anomalies in network traffic – such as fragmented packets and activity across non-standard ports – to alert network administrators of a potential intrusion, and provide the information required to conduct a thorough investigation
Host-based intrusion detection system
Host-based IDS runs on a host and monitors system activities for signs of suspicious behavior. Examples could be changes to the system Registry, repeated failed login attempts, or installation of a backdoor. Host-based IDSs usually monitor system objects, processes, and regions of memory
Perimeter intrusion detection system
Perimeter security system can protect not only the insides of industrial or business premises, but also the objects and articles of value located within the guarded area to ensure protection against burglary and vandalism in terms of access control measures, surveillance and security testing processes
VM-based intrusion detection system
Design a particular VM that provides intrusion detection services for other VMs. Especially, the rule list can be constructed dynamically for each virtual machine respectively
Meet Your Intrusion Detection System Objectives & Needs