We are currently not accepting applications for IDS/IPS due to renewal of the services.
Protect your information assets from external threats and dangers
IDC Frontier's Intrusion Detection/Prevention Services keeps your network updated, and detects signs of serious threats such as unauthorized accesses or attacks to protect your systems from them. The services is offered in 2 different types: one is cloud-based, which is shared with others, and the other as a dedicated appliance.
Traffic towards your network is always monitored. If an intrusion attack is detected, an alert notification is sent out to you or a protective measure is fired automatically.
The cloud-based services lets you install the services without adding any changes to your network configurations.
Quick start with the cloud-based services
The IDS/IPS functions are provided as services, letting you use them whenever and however long you need them without purchasing any equipment. The cloud-based services lets you install the services without adding any changes to your network configurations.
Various signatures are provided in the lastest versions to protect customers' systems.
Threats are filtered out before they go into customers' networks.
Customers' communication devices do not get burdened.
Even extensive attacks are taken care of
Effective with attacks of 10 gigabits or similar sizes as well.
The system can be installed on any infrastructure environment
The strong security measures are available no matter what infrastructure your systems are on: Data Center (housing), Bare Metal servers, or Cloud services.
Provided also in a dedicated appliance.
You can select among many different appliances. Please consult with us.
The following 2 types of services are available.
|Intrusion Detection (IDS)||Intrusion Prevention (IPS)|
|Description||Attacks are detected based on IDCF's standard static signature, and alert notifications are sent out automatically. Detection types and set values are uneditable.||Attacks are detected based on IDCF's standard static signature, and the protective activities automatically kick in. Detection types and set values are uneditable.|
*The listed prices do not include tax.
- You can have your important assets under 24/7 protection.
- You can reduce the time to deployment and the number of security personnels.
- You can improve your security system while reducing TCO.
- You can avoid unnecessary downtime by warnings made at an early stage and cutting off ever-increasing threats on the Internet promptly.