Parameter comparison
Portable version of Venus Sky Realm Vulnerability Scanning System NSFOCUS ICEYE-1200P-03
[Out of stock in Beijing 2008-03-13] ¥120 Reference price ¥752,400 [Beijing]
Venus Brand NSFOCUS Technology
Chinese Language version Chinese
None Version number None
Portable Version Version type No type distinction
CPU: no less than PIII 500, memory: 256MB or more Applicable hardware environment ICEYE-1200P-03 type, 2U hardware platform, two 1000M interface module slots, one management port , supports one IPS plus one IDS or three IDS
Windows 9X/2000/2003/NT/XP, Sun Solaris, HP Unix, IBM AIX, IRIX, Linux, BSD, etc., MSSQL, ORACLE, SYBASE , DB2, MySQL database Applicable software environment Windows operating system
The Tianjing vulnerability scanning and management system has three types: stand-alone version, portable version, and distributed version, with distributed scanning, centralized management, comprehensive analysis, Multi-level control function. It can conduct vulnerability scans on multiple networks across regions at the same time, and can centrally manage and configure each scanning engine, centrally analyze the scanning results, and provide detailed system vulnerability patching solutions.
System Introduction
The Sky Mirror Vulnerability Scanning and Management System is a network-based security performance evaluation and analysis system independently developed by Venus Star Information Technology Co., Ltd. It adopts a practical method of scanning and analysis The network system comprehensively detects the weaknesses and vulnerabilities existing in the network system, and provides them to users in the form of reports, and timely proposes repair methods and security implementation strategies. The Sky Mirror Vulnerability Scanning and Management System contains a security vulnerability library based on international standards. , and keep pace with the latest international standards through network upgrades.
Functional features
Powerful scanning function
Adopts a modular structure system, which is conducive to the expansion of product functions. It also adopts a high-frequency scanning driver, combined with A comprehensive database of scanning methods enables comprehensive, high-density scanning of networks and systems; the introduction of multi-thread scanning and breakpoint scanning technology further improves work efficiency, saves scanning time, and improves the flexibility and scalability of product applications. adaptable to the network needs of enterprises of all sizes.
Target systems supported for scanning
Mainstream operating systems: Windows 9X/2000/2003/NT/XP, Sun Solaris, HP Unix, IBM AIX, IRIX, Linux, BSD, etc.
Network equipment: Cisco, 3Com, Checkpoint FW, etc.
Database systems that support scanning: MSSQL, ORACLE, SYBASE, DB2, MySQL.
Complete and flexible user management functions
Allow users to log in with different user identities. Each user has different permissions, thereby maintaining the security of the system. and confidentiality between users.
Free customization of scanning strategies
For network applications, various scanning strategies such as scheduled scanning and progressive hierarchical scanning are built-in according to international conventions, and the function of customizing strategies is provided, allowing Users can customize strategies and scan according to their needs.
Detailed and flexible scan results report
The system comes with three different report templates, providing customized reports. Its template management function allows users to analyze the results according to the issues they are concerned about and what they are looking for. Generate new report templates in the required format to provide users with a more targeted basis for analyzing system security.
Detailed patching plan
Sky Mirror can accurately scan the defects or vulnerabilities in the system or network and propose detailed patching plans for each vulnerability.
Fast and convenient upgrade
Users can complete all upgrade work by logging in to the Venustech website, downloading the corresponding upgrade file and executing it. Detailed description The Ice Eye intrusion detection system consists of network detectors, SSL encrypted transmission channels, central console, log analysis system, SQL log database system and NSFOCUS Technology central upgrade site.
Product Features
The core requirement of an intrusion detection system is to accurately detect intrusion events and take effective measures for protection and intervention. Due to technical reasons and the continuous development of deceptive attack technology, false negatives and false positives have always been two major problems that plague the field of intrusion detection. NSFOCUS Technology has gathered the best security experts in the industry. After thorough research on various attack methods, it has summarized a set of effective detection methods. The false positive rate and false negative rate are far lower than those of similar products at home and abroad. The product has been evaluated and approved by authoritative organizations.
Extensive attack signature library
The Ice Eye intrusion detection system carries more than 1,800 attack signatures that have been carefully tested and tested over time, carefully refined by the famous NSFocus security team. become. Detailed descriptions and solutions are provided for each attack, corresponding to NSFocus ID, CVE ID, and Bugtraq ID. Administrators can directly click on the security patch URL link to directly upgrade the system to the latest version to avoid the second wave of attacks.
IP fragmentation reassembly and TCP stream aggregation
IceEye intrusion detection system has perfect IP fragmentation reassembly and TCP stream aggregation capabilities, and can detect hackers using any fragmentation method. attack.
Protocol identification
IceEye intrusion detection system can accurately identify more than 100 application layer protocols, Trojans, backdoors, P2P applications, IMS systems, online games, etc.
Protocol Analysis
IceEye Intrusion Detection System conducts an in-depth analysis of nearly 100 application layer protocols, including HTTP, FTP, SMTP...
Attack result determination
The Ice Eye intrusion detection system can accurately determine the final results of most attack behaviors including scanning and overflow.
Protocol anomaly detection
IceEye intrusion detection system has a powerful protocol anomaly analysis engine, which can accurately detect almost 100 unknown overflow attacks and 0-day Exploits.
Denial of Service Detection
The Ice Eye intrusion detection system adopts NSFOCUS’s Collapsar patented technology and can accurately detect SYN Flood, ICMP Flood, Connection Flood, Null Stream Flood, etc. Denial of service attack. Together with NSFOCUS Collapsar products, it can provide effective defense and protection