TippingPoint Intrusion Prevention System (IPS)
Defend critical data and applications without affecting performance and productivity. TippingPoint
Intrusion Prevention System uses in-line threat protection to stop the most sophisticated and advanced attacks. Get all the power and control of your own Dedicated Server for less! With a Iwebslog Virtual Dedicated Server, your RAM and storage are guaranteed - we never overload. Plus, you can add more capacity anytime with just a few clicks*. Not sure how to set it up? Our experts will help get your server up and running fast! Just choose the plan that's right for you, customize your bandwidth, control panel (Parallels® Plesk Panel or cPanel®) and backup options and leave the rest to us.
TippingPoint is the industry’s leading Intrusion Prevention System (IPS), unrivaled in security, performance, high availability and ease-of-use. The TippingPoint IPS is an in-line device that is inserted seamlessly and transparently into the network. Its switch-like performance characteristics allow it to be placed in-line at the perimeter, on internal network segments, at the core, and at remote site locations. These powerful enforcement points can be centrally controlled to institute and enforce business-wide security policies, allowing the TippingPoint IPS to see all network traffic and protect against external as well as internal attacks. |
Reliable
Find out right away if there’s an intrusion attempt with this in-line, bump-in-the-wire intrusion prevention system with layer-2 fallback capabilities. Effective Get comprehensive coverage with more than 8,200 security filters written to address zero-day attacks and known vulnerabilities. Simple See what matters most to you at a glance with a fully customizable dashboard and management console that deploys 33% faster than the competition. Fast Get up to 20GB of protection with less than 40 microseconds of network latency. |
|
Features and Benefits
Network Infrastructure Protection
|
Traffic Normalization
|
Proactive Network Security
Intrusion Detection Systems, by definition, only detect and do not block unwanted traffic. The TippingPoint IPS operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. In fact, TippingPoint optimizes the performance of good traffic by continually cleansing the network and prioritizing applications that are mission critical. TippingPoint’s high performance and extraordinary intrusion prevention accuracy have redefined network security, and fundamentally changed the way people protect their organization.
It is no longer necessary to clean up after cyber attacks have compromised network servers and workstations. No more ad-hoc and emergency patching and no more out of control, rogue applications like Peer-to-Peer and Instant Messaging running rampant throughout the network. Denial-of-Service (DoS) attacks that choke Internet connections or crash mission critical applications are a thing of the past.
TippingPoint solutions decrease IT security cost by eliminating ad-hoc patching and alert response, while simultaneously increasing IT productivity and profitability through bandwidth savings and protection of critical applications.
Unparalleled Performance
Blocking cyber-attacks at multi-gigabit speeds with extremely low latency requires purpose-built hardware. TippingPoint has taken such a revolutionary architectural approach needed for true Intrusion Prevention. Traditional software and appliance solutions operate on general-purpose hardware and processors and are simply unable to perform without degrading network performance. Through rigorous third-party testing, TippingPoint has demonstrated Intrusion Prevention at multi-gigabit speeds, with extraordinary attack prevention accuracy.
Threat Suppression Engine
TippingPoint’s ASIC-based Threat Suppression Engine (TSE) is the underlying technology that has revolutionized network protection. Through a combination of pipelined and massively parallel processing hardware, the TSE is able to perform thousands of checks on each packet flow. The TSE architecture utilizes custom ASICs, a 20 Gbps backplane and high-performance network processors to perform total packet flow inspection at Layers 2-7. Parallel processing ensures that packet flows continue to move through the IPS with a bounded latency of less than 84 microseconds, independent of the number of filters that are applied.
Comprehensive Security
TippingPoint performs comprehensive total packet flow inspection through Layer 7 to continually cleanse Internet and Intranet traffic and accurately eradicate attacks (worms, viruses, Trojans, blended threats, Phishing, Spyware, VoIP Threats, DoS, DDoS, Backdoors, Walk-in Worms, Bandwidth Hijacking) before damage occurs. TippingPoint protects network infrastructure by blocking attacks against routers, switches, DNS and other infrastructure equipment. Through TippingPoint’s Zero-Day Initiative (ZDI), customers are protected against new threats before vulnerabilities are disclosed to the public.
TippingPoint provides statistical, protocol and application anomaly protection to protect against traffic surges, buffer overflows, unknown attacks and unknown vulnerabilities. The TippingPoint IPS delivers traffic normalization to eliminate malformed or illegal packets, and performs TCP reassembly and IP defragmentation, thus increasing network bandwidth and protecting against evasion techniques. TippingPoint can also act as an access control firewall that can replace CPU intensive router and switch access control lists. Additionally, by rate limiting or blocking unwanted traffic, TippingPoint conserves bandwidth and server capacity to provide complete application protection.
Centralized Enterprise Management
TippingPoint delivers best-of-breed management capabilities that are simple to use and extremely powerful. The TippingPoint Security Management System (SMS) is a hardened appliance that provides global vision and control for the TippingPoint IPS. The SMS is responsible for discovering, monitoring, configuring, diagnosing and reporting for multiple TippingPoint systems. The TippingPoint SMS is a rack mountable appliance that features a state-of-the-art secure Java client interface that enables “big picture” analysis with trending reports, correlation and real-time graphs on traffic statistics, filtered attacks, network hosts and services, as well as IPS inventory and health.
Because the TippingPoint SMS provides a scalable, policy-based operational model, it enables straightforward management of large-scale IPS deployments. A typical network-wide TippingPoint deployment consists of SMS Clients (secure Java), a centralized Security Management System (SMS), and multiple TippingPoint systems.
A very effective component of TippingPoint’s SMS is the SMS dashboard. The dashboard provides at-a-glance monitors and launch capabilities into targeted management applications. The SMS dashboard displays an overview of current performance for all TippingPoint systems in the network, including notifications of updates and potential problems that may need attention.
Intrusion Detection Systems, by definition, only detect and do not block unwanted traffic. The TippingPoint IPS operates in-line in the network, blocking malicious and unwanted traffic, while allowing good traffic to pass unimpeded. In fact, TippingPoint optimizes the performance of good traffic by continually cleansing the network and prioritizing applications that are mission critical. TippingPoint’s high performance and extraordinary intrusion prevention accuracy have redefined network security, and fundamentally changed the way people protect their organization.
It is no longer necessary to clean up after cyber attacks have compromised network servers and workstations. No more ad-hoc and emergency patching and no more out of control, rogue applications like Peer-to-Peer and Instant Messaging running rampant throughout the network. Denial-of-Service (DoS) attacks that choke Internet connections or crash mission critical applications are a thing of the past.
TippingPoint solutions decrease IT security cost by eliminating ad-hoc patching and alert response, while simultaneously increasing IT productivity and profitability through bandwidth savings and protection of critical applications.
Unparalleled Performance
Blocking cyber-attacks at multi-gigabit speeds with extremely low latency requires purpose-built hardware. TippingPoint has taken such a revolutionary architectural approach needed for true Intrusion Prevention. Traditional software and appliance solutions operate on general-purpose hardware and processors and are simply unable to perform without degrading network performance. Through rigorous third-party testing, TippingPoint has demonstrated Intrusion Prevention at multi-gigabit speeds, with extraordinary attack prevention accuracy.
Threat Suppression Engine
TippingPoint’s ASIC-based Threat Suppression Engine (TSE) is the underlying technology that has revolutionized network protection. Through a combination of pipelined and massively parallel processing hardware, the TSE is able to perform thousands of checks on each packet flow. The TSE architecture utilizes custom ASICs, a 20 Gbps backplane and high-performance network processors to perform total packet flow inspection at Layers 2-7. Parallel processing ensures that packet flows continue to move through the IPS with a bounded latency of less than 84 microseconds, independent of the number of filters that are applied.
Comprehensive Security
TippingPoint performs comprehensive total packet flow inspection through Layer 7 to continually cleanse Internet and Intranet traffic and accurately eradicate attacks (worms, viruses, Trojans, blended threats, Phishing, Spyware, VoIP Threats, DoS, DDoS, Backdoors, Walk-in Worms, Bandwidth Hijacking) before damage occurs. TippingPoint protects network infrastructure by blocking attacks against routers, switches, DNS and other infrastructure equipment. Through TippingPoint’s Zero-Day Initiative (ZDI), customers are protected against new threats before vulnerabilities are disclosed to the public.
TippingPoint provides statistical, protocol and application anomaly protection to protect against traffic surges, buffer overflows, unknown attacks and unknown vulnerabilities. The TippingPoint IPS delivers traffic normalization to eliminate malformed or illegal packets, and performs TCP reassembly and IP defragmentation, thus increasing network bandwidth and protecting against evasion techniques. TippingPoint can also act as an access control firewall that can replace CPU intensive router and switch access control lists. Additionally, by rate limiting or blocking unwanted traffic, TippingPoint conserves bandwidth and server capacity to provide complete application protection.
Centralized Enterprise Management
TippingPoint delivers best-of-breed management capabilities that are simple to use and extremely powerful. The TippingPoint Security Management System (SMS) is a hardened appliance that provides global vision and control for the TippingPoint IPS. The SMS is responsible for discovering, monitoring, configuring, diagnosing and reporting for multiple TippingPoint systems. The TippingPoint SMS is a rack mountable appliance that features a state-of-the-art secure Java client interface that enables “big picture” analysis with trending reports, correlation and real-time graphs on traffic statistics, filtered attacks, network hosts and services, as well as IPS inventory and health.
Because the TippingPoint SMS provides a scalable, policy-based operational model, it enables straightforward management of large-scale IPS deployments. A typical network-wide TippingPoint deployment consists of SMS Clients (secure Java), a centralized Security Management System (SMS), and multiple TippingPoint systems.
A very effective component of TippingPoint’s SMS is the SMS dashboard. The dashboard provides at-a-glance monitors and launch capabilities into targeted management applications. The SMS dashboard displays an overview of current performance for all TippingPoint systems in the network, including notifications of updates and potential problems that may need attention.