Solutions

Overview

Overview

FireDragon uses proprietary algorithms to detect network and host bound attacks with complete context and attribution. Network security solutions have suffered from an abundance of false positives and an inordinate amount of activity that must be digested, analyzed, and converted into meaningful information.

FireDragon enables system administrator who’ve not had prior specific Cyber Security experience or certification to monitor, triage, and remediate the incident with complete context and attribution. This is important because our Active Intelligence Responder ® (AIR) will automatically collect all the necessary information for triage and provides a road map for remediation. After any incident, FireDragon provides the information necessary for postmortem in order to fortify your network.

Active Threat Detection

FireDragon Active Threat Detection® (ATD) will seek out and hunt for inbound threats with a vengeance! Our multi-threaded engine actively analyzes incoming traffic and finds the “needle in the hay stack.” We use behavior analysis, threat validation. By the time you’re notified of a threat, ATD will have gathered all of the required triage information that an expert Incident Responder requires to validate and determine the scope of the attack.

For Small Enterprises

FireDragon offers small enterprises the scale and affordability to implement a full scale Network Intrusion Detection System without spending huge amounts of resources for implementation, monitoring, remediation, and training.

For Small Businesses

FireDragon offers the small business the affordability to implement an easy to use Network Intrusion Detection System without having a resident Cyber Security Expert on premises. FireDragon does all the work for you!

For MSSP/MSP

FireDragon offers MSSP’s/MSP’s the opportunity to generate additional revenue by adding FireDragon’s CSaaS (Cyber Security as a Service.) Our security system provides all the tools you need to help your clients protect their environment!

Cyber Security

So, what is Cyber Security exactly? It encompasses many aspects of the same thing. Cyber Security, in simple terms, is your lock and key to your digital property! Take a listen to how we look at Cyber Security and how it can help you protect yourself.

SE2000

  • Throughput 1 Gbps
  • 1 TB Internal Drive with self-managing data manager
  • 4000 transactions per second
  • 4 Virtual Machines

SE1000​

  • Throughput 10 Gbps
  • 1 TB Internal Drive with self-managing data manager
  • 4000 transactions per second
  • 4 Virtual Machines

FireDragon Sentry

  • Throughput 1 Gbps
  • 128 GB SSD Internal Drive with self-managing data manager
  • 2000 transactions per second
  • 2 Virtual Machines

SB200

  • Throughput 1 Gbps
  • 1 TB Internal Drive with self-managing data manager
  • 4000 transactions per second
  • 4 Virtual Machines

SB100

  • Throughput 1 Gbps
  • 1 TB Internal Drive with self-managing data
    manager
  • 2000 transactions per second
  • 2 Virtual Machines