By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
It compares traffic against a constantly updated database of recorded network use. Should any anomalies occur outside the developed pattern - such as malicious commands, repeated failed log-in attempts or traffic peaking at odd hours - KeyDetect raises an alarm which is logged in a database, triggering a real-time response from Objectronix staff.
A firewall can never be totally secure - if it is configured to allow http/https traffic to a Web server, then any http traffic will be allowed through. A network-based intrusion detection system complements a firewall by monitoring network activity, looking for suspicious activity and raising alarms when such patterns are evident.
Operated via a secure VPN link with its own firewall, KeyDetect is unobtrusive to users as it does not affect the speed of traffic passing across the network and Objectronix staff do not need access to any critical systems. It can be branded either as a channel partner's own device or as Objectronix hardware. On the managed system side, the service can be branded by Objectronix or as a partner's own management service.