What our Product Provides

Quality

FireDragon’s  development is based on years of  research.  It’s effectiveness is based on years of experience.

Speed

Put some speed into spotting infractions and decrease the spread of malware across your network.

Efficiency

Knowledge is power. Let knowledge strengthen you and weaken the hackers.

Cost

Lowering the cost of security means greater protection for more companies.

 

Network intrusion detection system (NIDS)

A NIDS is an independent platform that identifies intrusions by examining network traffic and monitors multiple hosts. NIDS gain access to network traffic by connecting to a network hub, switch configured for port mirroring or a network tap. In a NIDS, sensors are placed at choke points in the network, often in the network “demilitarized zone” (DMZ) or at network borders. Sensors capture all network traffic and analyze the content of individual packets for malicious traffic.

  •      Analyze log files and extract suspicious url’s
  •     Behavior analysis
  •     Processes, ProcessTree,
  •     Files created/read
  •     Registry keys created/modified
  •     Virus total information
  •     Detection rate
  •     Process strings
  •     Analytics to help determine rate of intrusion
  •     Frequent network destinations
  •    Domains, users, and hosts that are frequently being targeted.
  •    Reporting structure for quick analysis

All The Right Things

Information to keep you ahead of the hackers

in all the right places

you networks best resource

Easy to Understand Interfaces

 


Product Features

  • FireDragon can be used to analyze the following types of files:
  • Syslog protocol: Firewall logs can be analyzed (using our FireFilter© algorithm) and suspicious binaries can be downloaded and analyzed.
  • Generic Windows executables
  • DLL files
  • PDF documents
  • Microsoft Office documents
  • URLs and HTML files
  • PHP scripts
  • CPL files

Product Feature

FireDragon can be used to analyze the following types of files:

  • Syslog protocol: Firewall logs can be analyzed (using our FireFilter© algorithm) and suspicious binaries can be downloaded and analyzed.
  • Generic Windows executables
  • DLL files
  • PDF documents
  • Microsoft Office documents
  • URLs and HTML files
  • PHP scripts
  • CPL files
  • Visual Basic (VB) scripts
  • ZIP files
  • Java JAR
  • Visual Basic (VB) scripts
  • ZIP files
  • Java JAR

Signup Today For Demo

Join Today