Application Scenarios
In the network security IDS/IPS scenarios, data distribution uses acceleration libraries such as Hyperscan for rule matching.
- Intrusion detection and prevention
It monitors network traffic or system activities to identify abnormal behavior or known attack patterns, and then raises alerts or blocks malicious content.
- Firewall
It filters inbound and outbound traffic based on predefined rules, blocking unauthorized access.
- Application classification
It identifies applications in network traffic and enforces management policies.
- Cloud security service
It leverages multi-layered protection and intelligent technologies to help enterprises defend against threats such as Distributed Denial of Service (DDoS) attacks, data breaches, and Advanced Persistent Threats (APTs), across domains including data, networks, applications, and compliance.
Parent topic: Intelligent Data Analytics Introduction