Safeguard Your Network Against Invasion
Build a better mousetrap, and they’ll build a better mouse. Technological advancements have
resulted in higher skill sets for those who would invade your network and plunder those mission-
critical resources. How do you defend against this ever-growing threat?
eTrust Intrusion Detection (by Computer Associates) delivers state-of-the-art network protection
including but not limited to, defense against deployment and execution of Distributed Denial of
Service (DDOS) attacks, malicious and unauthorized use of internet facilities and other network
misuse events. Protecting against DDOS attacks is an essential capability at a time when
networks are susceptible to an increasingly sophisticated array of attacks.
A truly comprehensive solution, eTrust Intrusion Detection includes an integrated URL scanning
engine. This auto updating solution, allows administrators to view and check the content of all
TCP/IP sessions in real time to monitor compliance with a companies acceptable usage policy
(AUP).All incoming and outgoing traffic is checked against a categorized list of websites to ensure
compliance. It is then checked for content, malicious codes and viruses. If a violation occurs the
sensor will notify the administrator of offending payloads.
This powerful solution takes the "detect, alert, prevent" approach to safeguarding networks
providing real-time, non-intrusive detection, policy-based alerts, ad automatic prevention. Other
protective capabilities include enforcing business-use policies through dynamic URL blocking and
logging. Fully open and extensible, eTrust Intrusion Detection extends to other protection
products such as proxies, routers and firewalls.
CA’s eTrust Intrusion Detection features:
Complete Intrusion Prevention
Top 10 eTrust Intrusion Detection Key Benefits
Network Access Control eTrust Intrusion Detection uses a rule base to define which users can access specific resources on the network,
ensuring only authorized access to network resources.
Integrated Antivirus Engine eTrust Intrusion Detection uses the InoculateIT scanning engine to detect and block network traffic containing
computer viruses. It protects users from innocuously transmitting and receiving virus-infected files.
Comprehensive Attack eTrust Intrusion Detection automatically detects attack patterns from network traffic, while the attack is in progress.
Pattern Library The signature file can be updated -via the CA web site - to ensure the most up-to-date protection.
Packet Sniffing Technology eTrust Intrusion Detection operates in stealth mode, remaining undetectable to attackers.
URL Blocking Administrators can designate URLs that users are not allowed to visit, preventing unproductive Web surfing.
Word Pattern Scanning With eTrust Intrusion Detection, administrators can define word patterns that may indicate policy violations. This
prevents sensitive data from being sent out without authorization via email or the Web.
Network Usage Logging eTrust Intrusion Detection allows network administrators to track network usage by end users, applications, and
more. It helps improve network policy planning and provides accurate network chargeback.
Intrusion Logging and eTrust Intrusion Detection provides a comprehensive system for capturing information and making it available for
Remote Management Remote users can access, view, and monitor an eTrust Intrusion Detection station. This is helpful to network
administrators that wish to change rules and policy from home.
Central Management The network administrator can monitor an entire network from one location.
Packet Based Rules Highly accurate method of analysis, allowing the sensor’s service to perform additional processing functions, invoke
Scripting actions and save the packets for future investigation. Packet Scripting also drastically reduces so called 'False
Positives' common to many IDS solutions.
CA’s eTrust Intrusion Detection: Recognition of Excellence
eTrust Intrusion Detection includes technologies formerly available as: eTrust Intrusion Detection Management
Consol Option, eTrust Intrusion Detection Log View, eTrust Intrusion Detection Remote.
The Technical Expertise:
This solution comes tested and integrated by the SYNNEX team of engineers. Tech Support is
available by the engineers who assembled and tested this solution. Our consulting services will
assure that you get the solution you need while our Migration and Interoperability support is
available by appointment for on-site installation and integration.
Visit the SYNNEX Innovations Solution Website at: www.synnexinnovations.com