HiTeCh - Hidden Tesla Checker
Intrusion system for Preventing attacks over the Internet. Developed by Prosmart Ltd.
The software for the Intrusion system for Preventing attacks over the Internet is a Linux-based solution produced and adapted by the Prosmart Ltd company.
Implementation and training is provided bz Prosmart company
Hardware characteristics
The system is in the form of the physical device (appliance). Physical devices and software solution installed on it are manufactured in the Prosmart Ltd company, production under the brand name "HITECH - Hidden Tesla Checker"
Specification of HiTeCh
HITECH is an "appliance" device with the capability of computer clusters through its own Infiniband 40Gbps connections. Clustering provides parallel operation of primary and High Availability and Failover.
Both primary and High Availability device have WDT - Watch dog timer embedded hardware module, which is a software supported. WDT in case of any fault, the software performs a hardware reset the device and automatically takes processing time to Failover device and vice versa.
The units are fitted with 4 AMD processors with 12 core.
Due to the short recovery time and quick restarts, we using two SATA SSD drive disks, capacity of 480GB in a RAID (which are up to 3 times faster than conventional magnetic disks) for providing a redundant storage system.
Working memory from 8x8GB DDR3 1600MHz, total of 64GB, provides plenty of working space for applied and basic processing demands.
Also the device has two doubled-redundant power supply power 1600W, energy efficiency over 90%. The device is in an industrial enclosure 19" 2U that has HotSwap - the ability to replace discs -"live" with a hardware RAID controller.
Software characteristics
- - HiTeCh system with 48 processors core and 64 GB DDR RAM, support 15 Gbps real traffic
- - HiTeCh system support 15.000.000 concurrent sessions
- - The system allows the inspection of over 250 different protocols (see below). The list is increasing with each new software upgrade. It is possible to users upgrade after adequate training
- - The system provides no additional devices and software: web application protection, application control, DLP protection and Client side attack protection application on Linux platform of their own custom software modules mod_security, mod_geoip2 and OWASP, and Application control module using AppArmor and grsecurity, for use DLP protection module OpenDLP and MyDLP for Client side attack protection using iptables module, nfTables, AdvancedPolicyFirewall, Swift, nf-HIPAC, nDPI, nTOP, Snort, NESSUS, Chkrootkit and its own internal modules.
- - The system has built-in intelligence that enables preventive blockade and of completely unknown attacks, which are not publicly known, and translated into a signature by combining several modules: AppArmor, grsecurity, different firewall solutions and tools NTOP, nDPI, Snort, ClamAV, and WireShark. These tools are combined and together intelligently provide the necessary preventive intelligence.
The list of protocols that are supported by inspection: