|
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
Third Brigade |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/content_TopLeftBorder.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/content_border.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
![](/web/20061206180936im_/http://www.bdc.ca/images/General/spacer.gif) |
![Third Brigade](/web/20061206180936im_/http://www.bdc.ca/NR/rdonlyres/egtgo4bjm2stmihp2nqrlzijn6kdperooia45tuas2fsmqql7ovevyd3pflxwtge4tqksnfy2vycjoxz7hjil5kp3pg/fc_ThirdBrigade.gif) |
Third Brigade is a leader in the emerging IT security field of Host Intrusion Prevention (HIP). Our Deep HIP approach, recognized by industry analysts as the approach required by a leading intrusion prevention system, provides server-based protection from the broadest range of attacks, and then goes several steps further: our patent-pending technology is actually able to neutralize attackers and normalize infected data, providing unparalleled protection to your most sensitive information. This Third Brigade solution shields systems during the vulnerability gap, the time from when a vulnerability is published to the time when systems with the vulnerability are patched. |
|
|
|
|