D-Link's IPS service adopts a unique technology �V
component-based signatures, which are built to recognize and protect against all varieties
of known and unknown attacks, and which address all critical aspects of an attack or
potential attack including payload, NOP sled, infection, and exploits.In terms of
signature coverage, the IPS database includes attack information and data from a global
attack sensor-grid and exploits collected from public sites such as the National
Vulnerability Database and Bugtrax. D-Link is committed to deliver high quality IPS
signatures by constantly creating and optimizing NetDefend signatures via the D-Link
Auto-Signature Sensor System. Without overloading existing security appliances, D-Link IPS
signatures ensure a high ratio of detection accuracy and the lowest ratio of false
positives.
Focus on Attack Payload,
not Attackers or IP Addresses The IPS scan engine is an in-depth inspection of data from Layer 2 to Layer 7
protecting against both false positives and false negatives and preventing various types
of network-based threats with a high degree of accuracy.
IM and P2P Management
D-Link's IPS service provides signatures to manage Instant Messaging (IM) and Peer-to-Peer
(P2P) applications, so that you control what IM and P2P applications are blocked or
allowed in your network.
Zero Day Attack Protection IPS captures variations of attacks and stealthy malicious traffic to prevent
outbreaks of these threats without creating unnecessary new signatures while still
protecting against Zero-Day attacks.
Continuous Automatic Signature Updates All IPS signatures are continuously updated automatically and made available
through D-Link update servers worldwide. The service keeps your IPS signature database as
current as possible at the outside of new threats.
Comprehensive IPS Signature Database Protect the system against network attacks using over 1,800 signatures as well as
protocol anomaly inspection.
Complete IPS Signature Advisory Complete IPS logs with vulnerability ID numbers, severity levels, attack
descriptions, and recovery solutions enable MIS personnel to know about and respond
quickly to network attacks.