Intrusion Prevention.Application vulnerabilities, buffer overflows and blended threats can open up your network to exploits, making intrusion prevention a necessary technology. SonicWALL goes a step beyond traditional solutions by scanning all network traffic for worms, Trojans, software vulnerabilities, backdoor exploits, and other types of malicious attacks. Utilizing a comprehensive signature database, the SonicWALL Intrusion Prevention Service (IPS) engine protects against an array of network-based application vulnerabilities and exploits. Deployed to protect against both internal and external threats, SonicWALL IPS monitors the network for malicious or anomalous traffic, then blocks or logs traffic based on predefined and automatically updated conditions. By focusing on known malicious traffic, SonicWALL IPS decreases false positives while increasing network reliability and performance.
Anti-MalwareEvery day, Trojans, spyware, viruses and other malware threats become more sophisticated, and now have the ability to circle the entire globe in a matter of minutes. To complicate matters, many of these threats are blended, originating from multiple sources, operating at multiple layers, utilizing multiple protocols. Moreover, they are delivered via Instant Messaging (IM), peer-to-peer (P2P), file sharing, games or other seemingly benign applications that are not scanned by traditional client anti-virus solutions. Small wonder then, that today's complex threats require a solution that goes beyond the status quo.
Unlike other solutions, SonicWALL RFDPI analyzes all files in real time—regardless of file size or compression—and generates proactive alerts that notify administrators whenever a threat is detected. Day-zero attacks are prevented with dynamically updated databases and an extensive list of virus and malware signatures. And, because all threats are blocked at the gateway, users are completely prevented from downloading malware in the first place. In addition, SonicWALL prevents auto-installation of ActiveX components (one of the most common sources of spyware) and stops any existing spyware programs from communicating with their hosts.