{"id":10797,"date":"2022-06-02T15:00:41","date_gmt":"2022-06-02T13:00:41","guid":{"rendered":"https:\/\/enginsight.com\/feature-overview\/ids_ips\/"},"modified":"2024-04-26T08:23:58","modified_gmt":"2024-04-26T06:23:58","slug":"ids_ips","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/ids_ips\/","title":{"rendered":"IDS_IPS"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"10797\" class=\"elementor elementor-10797 elementor-10245\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17537cb elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"17537cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-51295cd8\" data-id=\"51295cd8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"_id\":\"81bc933\",\"premium_gradient_colors\":\"#283AB8\"},{\"_id\":\"3ebcf24\",\"premium_gradient_colors\":\"#8D379E\"},{\"_id\":\"64cb559\",\"premium_gradient_colors\":\"#F13484\"},{\"_id\":\"88a4e48\",\"premium_gradient_colors\":\"#FF605D\"}]}' class=\"elementor-section elementor-inner-section elementor-element elementor-element-43870420 premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43870420\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-237c2376\" data-id=\"237c2376\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3eeb9d9c premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"3eeb9d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Host based intrusion Detection and Prevention <\/span><span class=\"premium-dual-header-second-header \">Your attack detection system on any server and client<\/span><\/h1> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-222ff9b4 elementor-widget elementor-widget-text-editor\" data-id=\"222ff9b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What to do if the attacker got behind the firewall or there are no patches available for vulnerabilities? No problem. Now your Intrusion Detection and Prevention System from Enginsight takes care of that.   <\/p>\n<p><strong>With Enginsight, you can detect attacks and anomalies on any client and server and block them automatically. <\/strong><\/p>\n<p>Perfect for hybrid IT environments: Cloud, Local, Home Office<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd5fc5d elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-global elementor-global-25309 elementor-global-23749 elementor-widget-button\" data-id=\"2bd5fc5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/en\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Request demo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3524ada2 elementor-align-right elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget elementor-widget-global elementor-global-25311 elementor-global-23752 elementor-widget-button\" data-id=\"3524ada2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/app.enginsight.com\/#\/signup\" id=\"ngs-top-registrieren\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start now for free<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-39ce1d99\" data-id=\"39ce1d99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ca9fc41 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca9fc41\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26df55f8\" data-id=\"26df55f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-59e70abe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"59e70abe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7237062a\" data-id=\"7237062a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f61d4e premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"1f61d4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">This is why you need an IDS <\/span><span class=\"premium-dual-header-second-header \">Dig out rat nests!<\/span><\/p> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-709a8c10 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"709a8c10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Mark Semmler (born 1973) has been working worldwide for more than 25 years to secure information and IT infrastructures. Here he explains why an intrusion detection system is important and what it does in the first place. Also understandable for non-techies &#x1F609;  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-31349af0\" data-id=\"31349af0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59a48ee premium-video__glow-none elementor-widget elementor-widget-premium-addon-video-box\" data-id=\"59a48ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"premium_video_box_video_type\":\"youtube\",\"aspect_ratio\":\"169\",\"video_lightbox_style\":\"elementor\"}' data-widget_type=\"premium-addon-video-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t\n\t\t\t\t\t<div data-lightbox='{\"type\":\"elementor\"}' id=\"premium-video-box-container-59a48ee\" class=\"premium-video-box-container\" data-overlay=\"false\" data-type=\"youtube\" data-thumbnail=\"1\" data-hover=\"zoomin\">\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"premium-video-box-inner-wrap\" data-video-animation=\" animated-\" data-delay-animation=\"\">\n\t\t\t\t\t\t<div data-elementor-open-lightbox=\"yes\" data-elementor-lightbox='{\"type\":\"video\",\"videoType\":\"youtube\",\"url\":\"https:\\\/\\\/www.youtube.com\\\/embed\\\/2MIfK7jULKY?feature=oembed&amp;rel=0&amp;mute=0&amp;loop=0&amp;controls=1&amp;playsinline=0&amp;cc_load_policy=0\",\"modalOptions\":{\"id\":\"elementor-lightbox-59a48ee\",\"entranceAnimation\":\"\",\"entranceAnimation_tablet\":\"\",\"entranceAnimation_mobile\":\"\",\"videoAspectRatio\":\"169\"}}' class=\"premium-video-box-video-container\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div style=\"background-image:url('https:\/\/i.ytimg.com\/vi\/2MIfK7jULKY\/maxresdefault.jpg')\" class=\"premium-video-box-image-container zoomin\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-play-icon-container\">\n\t\t\t\t\t\t\t\t<i class=\"premium-video-box-play-icon fas fa-play\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f1c5f01 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"1f1c5f01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5cac6fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5cac6fd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2c37ccf\" data-id=\"2c37ccf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b53110 elementor-widget elementor-widget-image-carousel\" data-id=\"8b53110\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"slides_to_show\":\"4\",\"navigation\":\"none\",\"lazyload\":\"yes\",\"pause_on_hover\":\"no\",\"pause_on_interaction\":\"no\",\"autoplay_speed\":0,\"speed\":10000,\"autoplay\":\"yes\",\"infinite\":\"yes\"}' data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Image Carousel\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/ZapfCreation-sw-1-q094tsonfus5sokb027hqfs8bt79dwl2xaszo56134.png\" alt=\"ZapfCreation-sw\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/G-DATA-Logo-TIGS-2017-RGB-pwdtje60w4w3cy3jjnmft7c5795ouezzvrw57b1szk.jpg\" alt=\"G DATA Logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/tuev-WEISS-plwfonhj0gjdp9oryhqccjr5a360tgnrhd4s5yrmdc.png\" alt=\"t&#xFC;v WEISS\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Logo_Teilnehmer_Web-200x83xc-pct68u26be1yvetevoin98h7fcwr2zqt3rxdx18nwg.png\" alt=\"Allianz_fuer_Cybersicherheit_Enginsight\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/402px-Logo_TSG_Hoffenheim.svg-q9cihbab4cxicz309g1m8gy9j7r3dtqitqbg6prncw.png\" alt=\"Logo der TSG Hoffenheim\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/schaefer-holding-logo-2-q4y2lklcscaz3kij4pnp9qm9gj79gm72wdfu1n1s74.jpg\" alt=\"schaefer-holding--logo\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/TuevIT-q9cjpvst6jxyvccd07lryq23jy2nd5obybxae1ombk.png\" alt=\"TuevIT\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/Bildungsministerium-q0947e74k045393rtdllb3aqn7mbxlnduf2dwqdtds.jpg\" alt=\"Bildungsministerium\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/lvv-orvd89v9ad0zrxv9vpg3t9im4r5jf672cjj4auvx8g.jpg\" alt=\"lvv\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/langeoog-orvdagtp8g12v6ol2nkrmplc14cddqwinebwm3mups.jpg\" alt=\"Langeoog\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"11 of 11\"><figure class=\"swiper-slide-inner\"><img class=\"swiper-slide-image swiper-lazy\" data-src=\"https:\/\/enginsight.com\/wp-content\/uploads\/elementor\/thumbs\/hanseyachts-orvd9rg23x2c5ppg6ulu9dzvzptglx3rjwpsnmohds.jpg\" alt=\"hanseyachts\"\/><div class=\"swiper-lazy-preloader\"><\/div><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75826ddd elementor-widget elementor-widget-spacer\" data-id=\"75826ddd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a41585a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a41585a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a9c82a0\" data-id=\"3a9c82a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-849b1d7 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"849b1d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">How the IDS\/IPS - Intrusion Detection and Prevention System works <\/span><span class=\"premium-dual-header-second-header \">Detect and block attacks<\/span><\/h3> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64c760c4 elementor-widget elementor-widget-text-editor\" data-id=\"64c760c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"MsoNormal\">With the Intrusion Detection System, you scan network traffic for attacks &#x2013; the Intrusion Prevention System then blocks them. In combination, they make the invisible visible &#x2013; and the insecure secure. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-44ffa387 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44ffa387\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-51b10601\" data-id=\"51b10601\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f53471c elementor-widget elementor-widget-text-editor\" data-id=\"2f53471c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>LIVE DETECTION OF CYBER ATTACKS<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ef18dbb elementor-widget elementor-widget-heading\" data-id=\"7ef18dbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Analysis and evaluation of the attacks<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdea30d elementor-widget elementor-widget-text-editor\" data-id=\"bdea30d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight&#x2019;s Intrusion Detection and Prevention System keeps you up to date on the status of potential attacks. Learn where attacks originate and how far they have come. Your complete <b>internal network<\/b> monitoring in one platform.   <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b39aa4 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"5b39aa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">An overview of all attacks in the IT environment<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analysis and evaluation of the attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Inform responsible persons automatically<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automatic response \/ Bocking<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e2328ab\" data-id=\"1e2328ab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea7d16a elementor-widget elementor-widget-image\" data-id=\"ea7d16a\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"IDS IPS mit Enginsight - Netzwerkanomalien Dashboard\" title=\"IDS IPS mit Enginsight - Netzwerkanomalien Dashboard\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IDSIPS_Netzwerkanomalien_Uebersicht.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"IDSIPS_Netzwerkanomalien_Uebersicht\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTA0NTcsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL0lEU0lQU19OZXR6d2Vya2Fub21hbGllbl9VZWJlcnNpY2h0LnBuZyJ9\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IDSIPS_Netzwerkanomalien_Uebersicht.png\" class=\"attachment-large size-large wp-image-10457\" alt=\"\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6323584 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6323584\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-480c43eb elementor-hidden-mobile\" data-id=\"480c43eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa9f1cc elementor-widget elementor-widget-image\" data-id=\"fa9f1cc\" data-element_type=\"widget\" data-e-type=\"widget\" alt=\"IDS IPS Regelwerke zum Blockieren\" title=\"IDS IPS Regelwerke zum Blockieren\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IDSIPS_KonfigIPS.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"IDSIPS_KonfigIPS\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MTA0NTksInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvMjAyMlwvMDRcL0lEU0lQU19Lb25maWdJUFMucG5nIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"459\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2022\/04\/IDSIPS_KonfigIPS.png\" class=\"attachment-large size-large wp-image-10459\" alt=\"\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-64e8fa15\" data-id=\"64e8fa15\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69b0257b elementor-widget elementor-widget-text-editor\" data-id=\"69b0257b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Network security on any device<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70212f67 elementor-widget elementor-widget-heading\" data-id=\"70212f67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Scalable and home office ready<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a4430 elementor-widget elementor-widget-text-editor\" data-id=\"6a4430\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Home office devices in particular are usually more vulnerable to attacks. With Enginsight you stay secure and benefit from hardware-independent flexibility and scalability <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6760fbe elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6760fbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enginsight grows with your IT - without hardware upgrades<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Best security even outside the company network<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Performance and availability in harmony<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5e737508 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e737508\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-64b7d88\" data-id=\"64b7d88\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46eacc3f elementor-widget elementor-widget-text-editor\" data-id=\"46eacc3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Proactive &ndash; Detection &amp; Response<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cfc6d34 elementor-widget elementor-widget-heading\" data-id=\"3cfc6d34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">View into internal network\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a391862 elementor-widget elementor-widget-text-editor\" data-id=\"2a391862\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The decentralized approach allows you to detect and block attacks not only from the outside, but also in the internal network. Even with successful infiltration, attackers cannot spread further. <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f7ce88e elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"f7ce88e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Lateral Movement Detection of the attack<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"> Isolation of infected systems protects against outages<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check-square\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Protects you where a firewall reaches its limits<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6859fa02\" data-id=\"6859fa02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b09061f elementor-widget elementor-widget-image\" data-id=\"5b09061f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke.gif\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"FIM-Regelwerke\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjE2MjUsInVybCI6Imh0dHBzOlwvXC9lbmdpbnNpZ2h0LmNvbVwvd3AtY29udGVudFwvdXBsb2Fkc1wvRklNLVJlZ2Vsd2Vya2UuZ2lmIn0%3D\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"411\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke-1024x526.gif\" class=\"attachment-large size-large wp-image-21625\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke-1024x526.gif 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke-300x154.gif 300w, https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke-768x395.gif 768w, https:\/\/enginsight.com\/wp-content\/uploads\/FIM-Regelwerke-1536x789.gif 1536w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-52daa563 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"52daa563\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68d2fd09\" data-id=\"68d2fd09\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a23ec19 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a23ec19\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"gradient\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1e057633\" data-id=\"1e057633\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c03e1a9 elementor-widget elementor-widget-text-editor\" data-id=\"c03e1a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Making the invisible visible<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d37bb18 elementor-widget elementor-widget-heading\" data-id=\"d37bb18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Detect cyberattacks in your network at an early stage<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d6aaa9 elementor-widget elementor-widget-text-editor\" data-id=\"5d6aaa9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A host-based intrusion detection and prevention system (HIDS\/HIPS) offers several advantages.<\/p>\n<p><strong>First<\/strong>, it enables close monitoring and analysis of system behavior and traffic directly on the host to detect anomalies and potential threats.<\/p>\n<p><strong>Second<\/strong>, it provides a specific layer of protection against targeted attacks on individual systems and can operate without being connected to a network.<\/p>\n<p><strong>Third<\/strong>, it enables direct response to detected threats, for example, by blocking or quarantining malicious processes.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9903891\" data-id=\"9903891\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96da2ce premium-video__glow-none elementor-widget elementor-widget-premium-addon-video-box\" data-id=\"96da2ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings='{\"premium_video_box_video_type\":\"youtube\",\"aspect_ratio\":\"169\",\"video_lightbox_style\":\"elementor\"}' data-widget_type=\"premium-addon-video-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\t\t\n\t\t\t\t\t<div data-lightbox='{\"type\":\"elementor\"}' id=\"premium-video-box-container-96da2ce\" class=\"premium-video-box-container\" data-overlay=\"true\" data-type=\"youtube\" data-thumbnail=\"1\" data-hover=\"zoomin\">\n\t\t\t\t<div>\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"premium-video-box-inner-wrap\" data-video-animation=\" animated-\" data-delay-animation=\"\">\n\t\t\t\t\t\t<div data-elementor-open-lightbox=\"yes\" data-elementor-lightbox='{\"type\":\"video\",\"videoType\":\"youtube\",\"url\":\"https:\\\/\\\/www.youtube.com\\\/embed\\\/eijBJ0JajBw?feature=oembed&amp;rel=0&amp;mute=0&amp;loop=0&amp;controls=1&amp;playsinline=0&amp;cc_load_policy=0\",\"modalOptions\":{\"id\":\"elementor-lightbox-96da2ce\",\"entranceAnimation\":\"\",\"entranceAnimation_tablet\":\"\",\"entranceAnimation_mobile\":\"\",\"videoAspectRatio\":\"169\"}}' class=\"premium-video-box-video-container\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div style=\"background-image:url('https:\/\/enginsight.com\/wp-content\/uploads\/Cube-NGS-Logo.jpg')\" class=\"premium-video-box-image-container zoomin\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-play-icon-container\">\n\t\t\t\t\t\t\t\t<i class=\"premium-video-box-play-icon fas fa-play\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"premium-video-box-description-container\">\n\t\t\t\t\t\t\t\t<p class=\"premium-video-box-text\">\n\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t\tPlay IDS\/IPS video\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27315c18 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27315c18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48999ce3\" data-id=\"48999ce3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0a0520 premium-header-block premium-header-block premium-lq__none premium-box-lq__none elementor-widget elementor-widget-premium-addon-dual-header\" data-id=\"d0a0520\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"premium-addon-dual-header.default\">\n\t\t\t\t\t\n\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"premium-dual-header-first-header \"><span class=\"premium-dual-header-first-span\">Functional scope Intrusion Detection and Intrusion Prevention System <\/span><span class=\"premium-dual-header-second-header \">Technical details of the IDS\/IPS<\/span><\/h6> \t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1986c1fd elementor-widget elementor-widget-text-editor\" data-id=\"1986c1fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What makes an attack detection system technical? <br>Below you will find the technical details of the Intrusion Detection and Prevention System with Enginsight and why automation plays a very important role in it.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8778c91 elementor-widget elementor-widget-toggle\" data-id=\"8778c91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1421\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1421\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Host-based IDS\/IPS<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1421\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1421\"><p>The technical basis of Enginsight&#x2019;s intrusion detection and prevention system is formed by the <strong>Pulsar agents<\/strong> installed on all servers and clients; <strong>the IDS\/IPS is therefore host-based<\/strong>. This is where Enginsight differs from network-based systems where the sensor is integrated at the switch, behind the firewall or in the firewall. This means that the <strong>IDS\/IPS can be scaled hardware-independently for any size of company<\/strong> and remains active even if a client leaves the company network, e.g. to the home office. <\/p>\n<p>The <strong>decentralized approach<\/strong> also makes it possible to detect and block attacks from within the internal network or even within a network segment. Attempts by hackers to spread further in the network after successful infiltration can thus be effectively prevented. <\/p>\n<ul>\n<li>Host-based<\/li>\n<li>Scalable<\/li>\n<li>Homeoffice-ready<\/li>\n<li>Detect and block attacks from internal network<\/li>\n<\/ul>\n<p>Further information about the <a href=\"https:\/\/enginsight.com\/de\/blog\/intrusion-prevention-system-ips-fuer-unternehmen-aller-groessen\/\">Intrusion Prevention System (IPS) for companies<\/a><\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1422\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1422\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Powerful detection scope<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1422\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1422\"><p>Enginsight examines the content of network traffic for a variety of suspicious activities. By targeting very basic attack types, the IDS covers all major categories of network-based attacks. This already makes it almost impossible for the attacker to spy out information, gain access or spread further into the systems unnoticed.  <\/p>\n<ul>\n<li>Port Scan (TCP, UDP)<\/li>\n<li>Spoofing (ARP, DNS)<\/li>\n<li>Bruteforce (e.g. on SSH, FTP, RDP, HTTP)<\/li>\n<li>Cross Site Scripting<\/li>\n<li>SQL Injection<\/li>\n<li>&#x2026; and much more!<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1423\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1423\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">SNORT Community Rules<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1423\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1423\"><p>The scope of attacks that Enginsight detects and blocks can be extended to include those described in the SNORT Communiy Rules. Thus, the IDS\/IPS also covers more specific attacks, for example on certain applications. For example, attacks on Microsoft IIS or Exchange Server, attempts to access sensitive data on a web server or CGI attacks can be identified. With just one click, SNORT Community Rules can be activated to benefit from advanced detection capabilities.   <\/p>\n<ul>\n<li>Detect and block attacks on specific software<\/li>\n<li>benefit from the large scope of SNORT Community Rules<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1424\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1424\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Definition of detection and blocking levels<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1424\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1424\"><p>Detection and blocking levels can be assigned to all servers and clients according to their protection needs. This brings security, performance and availability into the ideal balance. By grouping servers and clients beforehand using the tag system, the user can then set the desired levels for the groups using a simple slider.  <\/p>\n<ul>\n<li>Easy configuration<\/li>\n<li>Take over risk assessments<\/li>\n<li>Align security, performance and availability<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1425\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1425\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Analyze threat situation<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1425\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1425\"><p>In the platform, Enginsight consolidates the network attacks detected on all servers and clients. IP addresses, origin and attack vectors used can be viewed here. Each attack is rated according to urgency (high, medium, low).  <\/p>\n<p>In addition, Enginsight analyzes the stage the attacker has already reached: from information gathering, to trying to gain access, to spreading to other systems in the network. Responsible persons can be informed about critical conditions with an alert. <\/p>\n<ul>\n<li>An overview of all attacks in the IT environment<\/li>\n<li>Analysis and evaluation of the attacks<\/li>\n<li>Inform responsible persons automatically<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1426\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1426\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Define whitelists<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1426\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1426\"><p>Customized whitelist entries can be used to define unusual but harmless behavior to ensure availability and smooth operation. For example, a whitelist entry is the right choice to allow the software component of Enginsight&#x2019;s penetration testing to work properly. But other harmless activities on the network can also be handled specifically by IP address, attack vector, protocol and software.  <\/p>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-648c2a1c elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"648c2a1c\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62291a73\" data-id=\"62291a73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-724858e8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"724858e8\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3049e8ae\" data-id=\"3049e8ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a9cc6ee elementor-widget elementor-widget-image\" data-id=\"2a9cc6ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"795\" height=\"1024\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png\" class=\"attachment-large size-large wp-image-21750\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-795x1024.png 795w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-233x300.png 233w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-768x989.png 768w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1193x1536.png 1193w, https:\/\/enginsight.com\/wp-content\/uploads\/mario-jandeck-enginsight-1590x2048.png 1590w\" sizes=\"(max-width: 795px) 100vw, 795px\"\/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Mario Jandeck, CEO Enginsight GmbH<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1c2ef619\" data-id=\"1c2ef619\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74adee2f elementor-widget elementor-widget-heading\" data-id=\"74adee2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">FAQ on Intrusion Detection and Prevention<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f77b5de elementor-widget elementor-widget-toggle\" data-id=\"4f77b5de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1331\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1331\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">My firewall already has an IDS, what is the difference?<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1331\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1331\"><ul>\n<li>\n<p><strong>Protection against internal threats<\/strong>: Because HIDS is installed directly on the host, it can detect and respond to internal threats and insider abuse, while Firewall-IDS is primarily focused on external threats.<\/p>\n<\/li>\n<li>\n<p><strong>Granular monitoring and control<\/strong>: HIDS enables more granular monitoring and control of individual systems and applications and can take specific host-level defensive actions.<\/p>\n<\/li>\n<li>\n<p><strong>Network structure independence<\/strong>: HIDS is less dependent on the network structure and can also be used in environments where network traffic is not centrally routed through a firewall.<\/p>\n<\/li>\n<li>\n<p><strong>Anomaly and behavior change detection<\/strong>: By monitoring system activity and logs, HIDS can detect behavioral changes and anomalies at the host level that may be missed by a firewall IDS.<\/p>\n<\/li>\n<li>\n<p><strong>Offline and standalone protection<\/strong>: HIDS can also protect systems that are not constantly connected to the network or operate standalone, as it does not depend on a network connection.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"My firewall already has an IDS, what is the difference?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"<ul>\\n<li>\\n<p><strong>Protection against internal threats<\\\/strong>: Because HIDS is installed directly on the host, it can detect and respond to internal threats and insider abuse, while Firewall-IDS is primarily focused on external threats.<\\\/p>\\n<\\\/li>\\n<li>\\n<p><strong>Granular monitoring and control<\\\/strong>: HIDS enables more granular monitoring and control of individual systems and applications and can take specific host-level defensive actions.<\\\/p>\\n<\\\/li>\\n<li>\\n<p><strong>Network structure independence<\\\/strong>: HIDS is less dependent on the network structure and can also be used in environments where network traffic is not centrally routed through a firewall.<\\\/p>\\n<\\\/li>\\n<li>\\n<p><strong>Anomaly and behavior change detection<\\\/strong>: By monitoring system activity and logs, HIDS can detect behavioral changes and anomalies at the host level that may be missed by a firewall IDS.<\\\/p>\\n<\\\/li>\\n<li>\\n<p><strong>Offline and standalone protection<\\\/strong>: HIDS can also protect systems that are not constantly connected to the network or operate standalone, as it does not depend on a network connection.<\\\/p>\\n<\\\/li>\\n<\\\/ul>\\n\"}}]}<\/script>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d0beaed elementor-widget elementor-widget-text-editor\" data-id=\"6d0beaed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Enginsight&#x2019;s Intrusion Detection and Prevention System is part of the Enginsight Cybersecurity Platform. <\/p>\n<p>Would you like to know how you can improve your IT security with Enginsight? We would be happy to analyze your current status and real needs in the area of IT and network security together with you.  <\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-490a2037 elementor-align-left elementor-mobile-align-left elementor-widget__width-initial elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-button\" data-id=\"490a2037\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/enginsight.com\/de\/demo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange consultation appointment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Host based intrusion Detection and Prevention Your attack detection system on any server and client What to do if the attacker got behind the firewall or there are no patches available for vulnerabilities? No problem. Now your Intrusion Detection and Prevention System from Enginsight takes care of that. With Enginsight, you can detect attacks and [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-10797","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/10797","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=10797"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/10797\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=10797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}