Intrusion Demo

Demo Summary

In this video, you will see Shield by Intrusion, a device that sits at your network edge and watches all data coming in and out. You’ll watch the live dashboard show blocked connections, top risky sites, and a world map of traffic. The demo explains five risk levels, how Shield stops malware or bad devices from “calling home,” and how you can click to see why each block happened. You’ll learn how Shield frees up bandwidth, hides compromises, and sends reports or security logs to keep you safe.

AI-Detected Features

Introduction to ShieldOverview of the Shield device, its placement behind the firewall and ahead of the network, and its role in inspecting all inbound and outbound traffic.
00:00
Preventing Outbound Call HomeHow Shield stops compromised devices from calling home, blocking ransomware or malware before it leaves your network and hiding compromises from attackers.
00:24
Dashboard OverviewExplanation of the Shield dashboard: 24-hour rolling data, kill counts for DNS, TCP, and UDP, and a world map showing traffic sources and destinations.
01:29
Understanding Risk Levels 1 & 2Introduction to risk levels 1 and 2, covering low-risk internet “noise” like ads, tracking, VPNs, torrents and non-business sites that consume bandwidth.
02:41
Higher Risk Categories (Levels 3–5)Details on medium to critical risk levels: untrusted hosting providers (level 3), known malicious activity (level 4), and vetted command-and-control or APT sites (level 5).
04:59
Filtering by Risk LevelUsing the risk slider on the dashboard to filter out low-risk traffic and focus on level 3 and above or only the highest threats (levels 4–5).
06:51
Top Domains and Offending DevicesViewing the most requested domains and identifying internal devices with the highest number of blocked connections to guide remediation efforts.
07:19
Protect Mode and Traffic NavigationHow Shield’s protect mode safeguards your network while you remediate, and navigating between the map view and all-traffic view for detailed analysis.
08:31
Packet Inspection and Blocking LogicExplanation of Shield’s full packet-by-packet inspection, reputational analysis, AI/machine learning, and human vetting to decide which packets to allow or kill.
09:41
Real-World Threat ExamplesExamples of blocked threats such as async RAT, phishing and APT domains, illustrating why specific domains were categorized and killed.
10:42
Intrusion logo

Intrusion

Intrusion is a cyber threat intelligence company that exposes previously undetected network communications.Learn more about Intrusion

More Demos (1)

Interactive Demos (0)

Useful Links & Resources

Related companies