Two factor authentication (also called Multi Factor Authentication) is an extra step during login (authentication). 2-factor authentication is used on top of the normal authentication during the authentication process in applications. Usually this is no more than a username and / or email address with the corresponding password.
Two factor authentication requires two or more authentication tools (factors), these tools/factors are:
• Something the user knows (eg a password or a PIN code)
• Something the user has (eg a token or a mobile phone)
• Something that the user is (eg a fingerprint or an iris scan)
By using two or more factors, the application would be better protected against malicious threats/attacks, such as hackers. The main focus is on "something the user has" because most applications use this.
The menu on the left shows the products from the portfolio corresponding with the search keyword "2-factor authentication".
An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls that do not meet the configured policy of the firewall. The application firewall is typically built to control all network traffic on any OSI layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is - without additional software - unable to control network traffic regarding a specific application.
The menu on the left shows the products from the portfolio corresponding with the search keyword "Application Filtering".
Hillstone’s Abnormal Behavior engine continuously monitors the network to learn what normal network traffic looks like for that particular day, time, and month; providing alerts when network activity exceeds calculated thresholds. It uses a 50+ dimensional array to calculate normal network traffic from layer L4-L7, called “behavior modeling.”
In addition, it has been trained with real hacking tools to ensure that it will readily recognize malicious activity. These techniques limit false positives and provide the user with multiple opportunities to stop an attack.
The menu on the left shows the products from the portfolio corresponding with the search keyword " Abnormal Behavior Detection".
Advanced Threat Detection makes it possible to detect malware characterized by advanced ways to dodge or hide network security and new malware that has not previously been identified.
Advanced Threat Detection plays a crucial role in protecting data against advanced and persistent malware attacks. When Advanced Threat Detection solutions are integrated into a company's network security, they provide an additional critical source of information about threats to provide protection against zero-day attacks.
The menu on the left shows the products from the portfolio corresponding with the search keyword "Advanced Threat Detection ".