Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

SecPoint Products / Protector / Protector Questions FAQ Part3 /

Intrusion Prevention Secure categories

The Protector UTM Appliance Intrusion Prevention

has the following categories.

You can enable or disable and configure as you like.

Due to the powerfully CPU it can do deep scanning.

for blocking incoming/outgoing attacks

Backdoor Attacks  
Bad-traffic  
DNS  
DOS  
DDOS  
Exploit  
All Finger  
Finger  
FTP Attacks  
FTP  
TFTP  
ICMP  
IMAP attacks  
IMAP  
Mail attacks  
SMTP  
MYSQL  
NETBIOS  
NNTP  
Oracle  
POP2  
POP3 attacks  
POP3  
RPC  
Remote Services  
RTSP  
SCAN  
Shellcode  
SNMP  
SQL  
TELNET  
UPNP  
Virus  
WEB CGI  
WEB CGI DOS  
WEB Attacks  
WEB CGI COMMON  
WEB Coldfusion  
WEB IIS  
WEB Frontpage  
WEB Misc  
WEB Client  
WEB PHP  
WEB Attacks  
X11

 


 

 

➤ Related pages
Anti Virus vendors supported
Block gplus Google Plus
Captive Portal
Categories Intrusion Prevention
How to block social media?
How to block twitter?
How to Install a Firewall
Network Access Control NAC
Secure my server
Telephony Company Security
Web Filter
What is Bridge mode?
What is NAC?
What is the weakness of a firewall?
What is UTM firewall?
White list black list IP

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef