Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Advanced threat detection platform

NegotiableUpdate on 12/13
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
The current security threats facing the global Internet of the advanced threat detection platform are still showing a diversified development trend, and with the continuous development of big data analysis, machine learning, artificial intelligence and other emerging technologies, network attackers are also constantly upgrading their attack means, in order to conduct more covert and efficient malicious attacks on the target. The resulting threats such as data breaches, malicious extortion, and system damage are constantly emerging, posing great challenges to the security management of government departments, industry organizations, and enterprise units at all levels. Dipu Technology's new generation advanced threat detection platform is based on intelligent semantic analysis algorithms, combined with efficient sandbox dynamic analysis, rich feature rules, and comprehensive detection strategies. It targets APT intrusion pathways, discovers attack behaviors, and deeply detects advanced malicious code in APT attacks, effectively detecting new network attack behaviors while meeting compliance requirements. more
Product Details
PRODUCT FEATURES Product characteristics more
Intelligent semantic analysis Based on intelligent semantic analysis algorithms, combined with machine learning technology, web semantic analysis is integrated into security detection models, and a semantic intelligent analysis engine is constructed to enhance the ability to identify unknown threats and reduce detection false alarm rates.
Unknown threat detection Real time detection of network traffic, using high simulation virtual environment and intelligent scheduling engine for threat behavior detection, achieving fast detection, flexible scheduling, and effectively combating unknown threats.
Malicious file detection Combining static detection with dynamic analysis, we deeply detect over a hundred types of files, identify various viruses, trojans, worms, ransomware and other malicious programs, and achieve accurate detection of malicious files.
Attack traceability analysis Record attack behavior, locate compromised hosts, and form attack links based on relevant clues such as behavior trajectories and time trajectories based on alarm, event, and behavior information related to the attack, in order to track the attack behavior ..
Boundary integrity detection Comprehensively perceive the risk status of network boundaries, timely detect abnormal behaviors that damage the integrity of boundaries, quickly detect and eliminate false alarms, and achieve effective supervision of boundary security.
Linkage closed-loop disposal Provide visualization capabilities such as APT event analysis and attack geographic location views, combined with a big data analysis platform to form a multi-level linkage mechanism, to achieve the blocking and protection of APT attack behavior, and form an APT governance loop.
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
Advanced threat detection analysis Having comprehensive advanced threat detection and analysis capabilities, supporting effective detection and analysis of advanced threats such as malicious scanning behavior, phishing attacks, address spoofing, malicious program attacks, abnormal network communication, evasion of monitoring, unknown vulnerability exploitation, unknown Trojan horse propagation, etc
Deep file analysis Based on file detection engine combined with dynamic sandbox analysis, deeply analyze the security threats of document, executable, compressed, script and other files
Rich protocol restoration Capable of traffic collection and comprehensive parsing and restoration of various network protocols such as HTTP/FTP/SMTP/POP3/IMAP
Accurate dynamic and static detection Support virtual execution analysis and detection technology, combined with in-depth dynamic analysis modules, static analysis modules, and stable and efficient intelligent debugging frameworks, to identify the basic information and triggering behavior of sample software, improve the detection ability of malicious files, and reduce false alarms of normal files
Efficient virus detection The system is equipped with multiple virus detection engines for flexible combination and cross validation, enabling efficient detection of known malicious code such as viruses, trojans, worms, etc
Threat visualization Built in visual large screen display, providing intuitive presentation of APT events, behavior trajectories, and other information
Network characteristics Supports IPv4/IPv6 dual stack
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend