MeshFire: Real-Time Large-Scale "Security Grid"



所有跟贴·加跟贴·新语丝科技论坛

送交者: 火格Meshfire 于 2005-6-11, 04:39:11:

回答: Do you compete with Google? Video search is next wave... 由 火格Meshfire 于 2005-2-10, 14:27:20:

Security Grid for AntiVirus/Worm, Intrusion, Encryption
MeshFire is a large-scale distributed high-performance "security grid" to serve millions of multi-system heterogeneous devices for antivirus, worm, intrusion security enforcement, 24x7 anomaly monitoring and detection, and long-term historical data auditing.

How The Grid Works
Meshfire "security grid" has a built-in policy database, a real-time policy server, a policy decision engine, an event log collecting server, an event log database, and a self-learning anomaly detection engine. The system can work immediately in your environment to protect all your devices and applications. Meshfire builds a security grid from your existing environment, and does not force any changes.

Differentiation: Real-time, Large-Scale
Most other security vendors provide single-point-based products that handle small sclae environment, whereas MeshFire "security grid" provides real-time messaging to secure, monitor, audit, control and manage large-scale, millions of devices and billions of events. MeshFire security grid uses real-time software and appliance to implement high-performance massive multithreading backend server platforms for security, audit, and control. The grid capability makes MeshFire stand out from competitors in securing the entire dynamic environments, since there exists a big jump from a point software tool to MeshFire's large-scale distributed grid. The sophisticated skills and large development efforts in massive multithreading technology have built a high barrier to entry - "MeshFire was not built in a day".

Value Proposition, Benefits, Advantages
MeshFire "security grid" hides the complexity in large-scale distributed multi-system heterogeneous hierarchical environment. MeshFire XML open standards enable easy plug-and-play of heterogeneous devices, and thus removes the headache in securing millions of heteregeneous devices. With this complexity pain-killer, users can focus on their core business values, instead of drowning in large number of configuration files, policy rules, frequent changes/updates, vulnerability scan results, hacker intrusion and attacks, virus/worm outbreaks, false alarms, an ocean of monitoring event logs, etc.




所有跟贴:


加跟贴

笔名: 密码(可选项): 注册笔名请按这里

标题:

内容(可选项):

URL(可选项):
URL标题(可选项):
图像(可选项):


所有跟贴·加跟贴·新语丝科技论坛