The final layer of defense occurs at the File-System level during file input/output operations. The file system is where Imunify Antivirus comes into play.
Out of the Box Layered Protection at the Network Level
The Network layer consists of a Web-Application Firewall together with WebShield and a Network Firewall. This layer protects against different web attacks sent via HTTP/HTTPS as regular traffic and from a CDN or Proxy. Each component uses cloud-based information, and many attacks are blocked in real-time. Attackers cannot bypass the protection while collecting information. Additionally, the network layer does not wait for attackers to reach a threshold. Imunify360 offers 360 degrees protection leaving no possibility for the malware to go through to the clients’ servers.
Lastly, our Network Firewall and Intrusion Detection and Prevention Systems include IP management. This is an Imunify Pluggable Authentication Modules extension, Open Source HIDS Security, and Port Firewall that prevents all system services attacks against FTP, SSH, IMAP/SMTP, etc.
The majority of hosting providers say that remote exploit is a top issue for their customers’ web servers. With IDS and IPS in Imunify360, you will be protected from inside out and outside in.
Imunify360 features an excellent Intrusion Prevention System (IPS) that includes a comprehensive collection of “deny” policy rules that block all attacks. And are effective against those who use custom or well-known exploit tools.
By monitoring server logs, the Intrusion Detection System (IDS) provides excellent visibility of server security. It scans log files from several different angles and bans IPs that show signs of malicious activity. This activity includes password failures, potential exploits, etc., and reports the data Imunify360’s Dashboard.
Imunify360 combines WAF, IDS, IPS, Network Firewall, Proactive Defense, and File Antivirus as a single working engine. It shares data amongst all system components and provides a much higher level of protection. United under a centralized incident management system, this is “synergy” not found with separate standard security components installed on the system.
Centralized threat monitoring made easy
A central dashboard is available directly in your control panel. This lets you check the overall state of your server and manage all aspects of its security. The central dashboard displays all security events, with the latest incidents updated in real-time. The central dashboard is customizable and allows filtering and event selection based on various parameters, review the details of incidents, access white list and blacklist management features, view settings, reports, and much more.