Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
ahmed_aburaihan
Participant

IPS Signature working in Network

Hallo Mates,

 

How does a Check Point FW compares IPS Signatures with real Network Traffic and provide the result if the flow is malicious or not?

Can we somehow see the exact Signature for a specific vulnerability? 

 

 

Thank you for a feedback.

Kind Regards,

A

 

0 Kudos
3 Replies
PhoneBoy
Admin
Admin

Various pattern matchers integrated into the product perform IPS functions.
We do not expose the precise contents of our signatures.

AkosBakos
Advisor

0 Kudos
the_rock
Legend
Legend

Link Akos gave has some good info about it.

Andy

 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events