Skip to main content
TrustRadius
INTRUSION Shield

INTRUSION Shield

Overview

What is INTRUSION Shield?

INTRUSION Shield is a network protection solution designed to provide on-premise security for small, medium, and large enterprises. According to the vendor, Shield caters to the needs of IT professionals, cybersecurity analysts, network administrators, financial institutions, and healthcare organizations....

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Threat Intelligence Platforms

Be the first one in your network to review INTRUSION Shield, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is EclecticIQ Platform?

EclecticIQ Platform is an analyst-centric Threat Intelligence Platform (TIP). The vendor says it is optimized for the collection of intelligence data from open sources, commercial suppliers and industry partnerships into a single collaborative analyst workbench. EclecticIQ Platform aims to…

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

Return to navigation

Product Details

What is INTRUSION Shield?

INTRUSION Shield is a network protection solution designed to provide on-premise security for small, medium, and large enterprises. According to the vendor, Shield caters to the needs of IT professionals, cybersecurity analysts, network administrators, financial institutions, and healthcare organizations. It offers features such as real-time visibility, autonomous monitoring, and seamless integration to help businesses safeguard their networks against evolving threats and protect sensitive data.

Key Features

Real-time Threat Visibility: Shield On-Premise provides real-time visibility into network threats, allowing organizations to identify and understand potential risks.

Global Threat Engine: Powered by the Global Threat Engine, Shield On-Premise blocks malicious connections while allowing trusted IP connections, strengthening network security.

Real-time Connection Monitoring: Users can monitor a real-time list of blocked connections, including detailed information on the reason for blocking and the associated risk level.

Interactive Connection Map: An interactive map displays the countries with which the business communicates the most, helping to identify connection patterns and potential risks.

Device-based Threat Analysis: Users can identify devices with the highest number of malicious connection attempts, enabling prioritization of remediation efforts and improving network security.

Comprehensive Traffic Monitoring: Shield On-Premise monitors network traffic bidirectionally in real-time, providing complete visibility of all connections.

Intelligent Threat Identification: Leveraging historical IP records and reputation in the Global Threat Engine, Shield On-Premise instantly identifies malicious or unknown connections, allowing proactive threat mitigation.

24/7 Autonomous Monitoring: Shield On-Premise offers continuous protection and autonomous real-time network monitoring, reducing alert fatigue and ensuring round-the-clock security.

Zero-Day Threat Protection: By leveraging historical data, Shield On-Premise helps identify and block potentially malicious connections, including Zero-Day threats, without disrupting legitimate connections.

Seamless Integration: Shield On-Premise seamlessly integrates with existing security systems, streamlining operations and reducing the burden on technology, SOC, IT teams, and other security products.

INTRUSION Shield Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation