How to battle slowgrind bruteforce attacks against Windows servers

A black sphere and falling letters. Dystopian and IT-ish.

The default rule of Syspeace is that if an intruder fails to login more than 5 times within 30 minutes, the intruders IP address is blocked, tracked and reported for 2 hours and simply is denied any access to the server.  A new trend though has emerged and that is for bruteforce attackers to “slowgrind” through […]

Read more

Let’s look at some ROI: So far we’ve saved 4 292 968 US$

This is just a geeky, cost calculating experiment really. Nothing scientific or anything. Just a fun thought on how easy it is to calculate the ROI for the low cost of Syspeace licenses. Yesterday evening we had a really interesting meeting with a future reseller so we thought we’d take a look at the actual […]

Read more

Attacks and Countermeasures

Anything facing the Internet is a potential target for anyone who wants to gain access or disrupt your data operations. If it is here, people will try to get in or make it stop working. That is just the way it is, and I am sure you are aware of it. There are different methods for […]

Read more

HIPS (Host Intrusion Prevention System)

Brute force protection for Windows servers has been a nightmare until now. Syspeace is a low cost, easy to configure HIPS that automates the blocking of brute force attacks an dictionary attacks on Windows servers. Syspeace supports Exchange OWA, RDWEB, Exchange SMTP AUTH connectors, winlogon, terminal servers and more. Also included is a global blacklist […]

Read more

top