Our Intrusion Detection Systems (IDS) analyze network traffic for signatures that match known cyber attacks. FCOOS with its Intrusion Prevention Systems (IPS) analyzes packets, but can also stop the packet from being delivered based on what kind of attacks it detects and ensures the security over your network. This can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more.
• Real-time traffic monitor
• Packet logging
• Analysis of protocol
• Content matching
• OS fingerprinting
• Can be installed in any network environment.
• Creates logs
• Open Sourse
• Rules are easy to implement
Contact Us
+91 9900076884
Mail Us