Intruder detection device uses behavioural analysis

Intruder detection device uses behavioural analysis

Intruder detection device uses behavioural analysis
by Antony Savvas
Monday 13 June 2005

Symantec is introducing a new intrusion detection product that uses behavioural analysis to block potential attacks on enterprise networks.

The new Critical System Protection 4.5 system uses technology that Symantec acquired through last year’s purchase of Platform Logic. It is designed to protect desktops and servers against...

Article Continues Below

... viruses and worms that have yet to be unleashed in the wild.

It does this by studying existing applications and activities already taking place on the network and recording past attacks, to enable it prepare against future threats when they arrive.

Critical System Protection is designed to be used with existing Symantec anti-virus server and desktop client products, and will compete against similar systems from the likes of McAfee.



Tags:

intruder, detection, behavioural, analysisintruder, analysis, antony, savvas, symantec, introducing, intrusion, attacks, enterprise, networks, acquired, purchase, platform, logic, desktops, servers, continues, viruses, worms, unleashed, existing, applications, activities, recording, enable, server, desktop, products, compete, mcafee,

Latest Articles

  • Linux ln symlink how to update existing symbolic link
  • Ubuntu 18.04 / Linux Mint 19.1 Cannot Type or Login - solution
  • LUKS Hard Drive Encryption on Linux Mint Ubuntu Debian etc how to mount encrypted hard drive
  • How to use nmap locate other machines/computers/servers on your network using nmap
  • Linux Mint 18.2 Create Config File To Start Application Upon Login
  • Dell Wyse Thin Client BIOS Access Key
  • sudoers file in /etc warning about comments/includes!
  • Centos 7 Reallocate logical volume space to another
  • lvm how to reduce volume size
  • letsencrypt certbot error "Unable to find a virtual host listening on port 80 which is currently needed for Certbot to prove to the CA that you control your domain. Please add a virtual host for port 80."
  • SSH error cannot Forward or Listen "bind: Cannot assign requested address"
  • X11 SSH Linux Forwarding Error
  • Using Microsoft's Group Policy Management Editor (GPME) To Change Default Permissions and Internet Explorer Security Settings
  • Thunderbird How To Disable An Email Account
  • iptables linux firewall recommended rules for public computing
  • LVM How To Create Pool (dynamically allocated and not fully allocated)
  • VMWare Pro Workstation Nic Disconnected and No IP Using NAT
  • Linux How To Create A RamDisk
  • mdadm force resync when resync=PENDING solution
  • Proxmox Breaks Storage/LVM Backing If Killing QEMU-IMG