Rate This Document
Findability
Accuracy
Completeness
Readability

Application Scenarios

In the network security IDS/IPS scenarios, data distribution uses acceleration libraries such as Hyperscan for rule matching.

  • Intrusion detection and prevention

    It monitors network traffic or system activities to identify abnormal behavior or known attack patterns, and then raises alerts or blocks malicious content.

  • Firewall

    It filters inbound and outbound traffic based on predefined rules, blocking unauthorized access.

  • Application classification

    It identifies applications in network traffic and enforces management policies.

  • Cloud security service

    It leverages multi-layered protection and intelligent technologies to help enterprises defend against threats such as Distributed Denial of Service (DDoS) attacks, data breaches, and Advanced Persistent Threats (APTs), across domains including data, networks, applications, and compliance.