Description
The Loop-ISS2180 Autonomous Cyber Defender employs cutting-edge security technologies, such as firewalls, intrusion detection systems (IDS), intrusion prevention systems (IPS), and encryption technologies, to thoroughly combat rapidly evolving cyber threats and attacks.
The newly implemented intelligent security defense mechanism quickly identifies and counters emerging threats, enhancing enterprise network security through automatic threat detection and self-adapting response technologies. The joint defense console integrates security monitoring, incident response, and vulnerability management, providing centralized control over enterprise networks.
Furthermore, to cater to the diverse needs of different enterprises and organizations, ISS2180 offers a flexible deployment architecture that easily adapts to on-premises environments. It enhances network resilience, ensuring connectivity during attacks or disruptions, and provides robust protection for the enterprise’s assets.
[Joint Defense Console]
- Automated security incident response which leverages and adapts security policies based on context.
- Comprehensive event management interface with real-time alert to help administrators react quickly and resolve issues.
[Next Generation Firewall]
- Packet filtering and traffic inspection to block harmful attacks and malwares.
- Implement traffic control and multi-layer defense mechanisms to ensure intrusion prevention and application awareness.
[Multi-Layer Hierarchical Network Architecture]
- Loop-G7820 high-performance 10G L3 switch is utilized for implementing ERPS (G.8032) Ring Protection.
- Embedded Loop-iNET EMS provides real-time monitoring, management setting and abnormal alarm functions to boost management efficiency.
[IT Compliance Management]
- Compliance management on OS, browsers, firewalls, applications and network devices.
- Loop-ISS-2110 compliance automation platform for security policy implementation and monitoring following industrial regulations and guidelines such as CIS benchmarks and GCB (Government Configuration Baseline).
[IoT Environmental Monitoring]
- Equipped with Loop-IOT0510 IoT system using sensors and connected devices for environmental monitoring, anomalies detection, and notifications.
- • IoT based monitoring including temperature, humidity, intrusion, water leaks, and smoke detection for asset management and business critical applications.
[Integrated Endpoint Antivirus]**
- Capability to integrate different antivirus solutions for log collection and analysis.
- Real-time monitoring, scanning, and isolation of harmful files protect endpoint devices from external threats, while also collecting and analyzing logs.
[Unified Endpoint Management]**
- Intelligent endpoint management tools that provide advanced log collection and analysis on endpoint device health, vulnerabilities, and security threats.
- Enable automated endpoint protection including software installation, updates, and management.
[Enterprise IT Security Professional Services]
- On-demand and customizable consulting services for the strategies and solutions to protect mission critical infrastructure and applications.
- Vulnerability assessments and reports for risk analysis, measurements and remediation plan.
**Functions on demand