FireHunter6300 (V100R001 C30) Series Sandbox

Using virus- and reputation-based scanning, static analysis, and virtual execution technologies as well as Huawei’s unique behavior pattern library, the FireHunter6000 series is capable of detecting unknown malicious files and providing accurate detection reports accordingly. It interworks with other security devices to quickly block advanced malicious files, preventing unknown threats from spreading and protecting core information assets for enterprises. The FireHunter is especially applicable to finance and government agencies, energy providers, and high-tech enterprises.

Comprehensively and accurately detect unknown threats

Comprehensive, rapid, and accurate detection of advanced malicious files:

  • Simulates system environments and comprehensively detects 20+ types of malware vehicles to reduce false negatives and prevent unknown malware threats
  • Detects zero-day attacks in web traffic to ensure Internet traffic security
  • Uses multi-dimensional analysis methods, such as code analysis, dynamic execution, and intelligent behavior analysis, to reduce false positives
  • Implements multi-layer in-depth detection and responds to malware and unknown threats within seconds

Specifications

32-bit PE File Inspection Supports 32-bit Windows XP and Windows 7 operating systems
Compressed PE File Inspection Supports the decompression of and threat detection in ZIP, RAR, GZ, CAB, and 7Z files
Compressed Web File Inspection Supports the decompression of and threat detection in ZIP, RAR, GZ, CAB, and 7Z files
PDF File Inspection Supports Adobe Reader 9, X, and XI
Compressed PDF File Inspection Supports the decompression of and threat detection in ZIP, RAR, GZ, CAB, and 7Z files
Traffic Restoration of Layer-2 Protocols Supports Layer-2 protocols such as ETH, VLAN, and PPPoE in traffic restoration
Traffic Restoration of Application-layer Protocols Application-layer protocols supported by traffic restoration include HTTP1.0/1.1, FTP, SMTP, POP3, IMAP4, NFS V2/V3, and SMB/SMB2

Algunas de nuestras REPRESENTACIONES