Syspeace’s server protection is an anti-hacking software, for brute force attacks specifically. The Syspeace system is a Host-based Intrusion Detection and Prevention System (HIDPS).
Rules let you configure how certain accounts, domains or login method might change the requirements for Syspeace to notice an attacker, or raise the lockout period.
Responsive rules ensure block changes take effect immediately – including reshaping existing blocks and adding blocks retroactively.
You further customise it through local whitelisting and local, and global, blacklisting of certain IP addresses. Syspeace now also supports geo-blocking, stopping any login attempt from a specific region.
Syspeace’s Remote Status allow you to manage and view all your servers from one place
Based on our record, pfSense should be more popular than Syspeace. It has been mentiond 10 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Another thing we did with an RDP farm at an acquisition is have them install a host-based IDS/IPS like SysPeace. It has a terrible name but is really cheap (~$100 per server) and can block connections from a defined list of countries, block IPs after X number of login failures, etc. There are no magic bullets but it made us feel a little safer. Source: almost 3 years ago
Https://pfsense.org (netgate hardware is used in businesses). Source: about 1 year ago
I am having trouble seeing available packages, updating pkg, or getting a response from pfsense.org. Is anyone else seeing this or am I going to spend the rest of my day chasing bugs? Source: over 1 year ago
From the PIA Client to pfsense.org PING pfsense.org (208.123.73.69) from 10.6.112.128: 56 data bytes 64 bytes from 208.123.73.69: icmp_seq=0 ttl=49 time=49.455 ms 64 bytes from 208.123.73.69: icmp_seq=1 ttl=49 time=51.927 ms 64 bytes from 208.123.73.69: icmp_seq=2 ttl=49 time=49.333 ms 64 bytes from 208.123.73.69: icmp_seq=3 ttl=49 time=49.133 ms 64 bytes from 208.123.73.69: icmp_seq=4 ttl=49 time=49.027 ms ... Source: over 1 year ago
The above setup is critical to a reliable system. I'd use enterprise quality routers for a store and home connection. I personally use https://pfsense.org but there are many to choose from and several open source. Source: over 1 year ago
What I would do is put that thing in DMZ and install a good router behind it like https://www.pfsense.org. No affiliation, just been my router for many years. There's also it's sibling https://opnsense.org. There are many, just get a enterprise quality router. Source: over 1 year ago
RdpGuard - RdpGuard allows you to protect your Remote Desktop (RDP), POP3, FTP, SMTP, IMAP, MSSQL, MySQL, VoIP/SIP from brute-force attacks by blocking attacker's IP address. Fail2Ban for Windows.
MikroTik RouterOS - The main product of MikroTik is a Linux-based operating system known as MikroTik RouterOS.
Fail2ban - Intrusion prevention framework
OPNsense - OPNsense® you next open source firewall. Free Download. High-end Security Made Easy™. Offers Intrusion Prevention, Captive Portal, Traffic Shaping and more.
IPBan - Block hacking attempts on RDP, SSH, SMTP and much more
OpenWrt - OpenWrt is an open-source firmware based on Linux for wireless routers