{"id":4506,"date":"2024-11-26T13:48:33","date_gmt":"2024-11-26T11:48:33","guid":{"rendered":"https:\/\/blog.gdsys.de\/en\/?p=4506"},"modified":"2024-11-26T13:48:33","modified_gmt":"2024-11-26T11:48:33","slug":"how-our-new-matrix-feature-protects-against-brute-force-attacks","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/","title":{"rendered":"How our new matrix feature protects against brute-force attacks"},"content":{"rendered":"<p>Cyberattacks are a serious threat to businesses worldwide. According to IBM&#8217;s <a href=\"https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-52629\" target=\"_blank\" rel=\"noopener\">X-Force Threat Intelligence Index<\/a>, 32% of all attacks last year targeted Europe, with the misuse of valid accounts and phishing each accounting for 30% of incidents. North America moves up to second place, making up 26% of all cases, while Asia-Pacific falls from first to third, accounting for 23%. To effectively protect systems and data, it is crucial to implement comprehensive security measures and keep them continuously updated. Our KVM matrix systems offer numerous <a href=\"https:\/\/www.gdsys.com\/en\/more-from-g-d\/features\/security-features\" target=\"_blank\" rel=\"noopener\">security features<\/a> that help protect the deployed IT infrastructure. One useful feature supports in preventing and detecting brute-force attacks early on.<\/p>\n<h2>What is a brute-force attack?<\/h2>\n<p>A brute-force attack is a method where attackers attempt to gain access to a system by trying various combinations of usernames and passwords. These attacks can be automated and highly effective if no countermeasures are implemented. Supported by automated software, attackers can perform thousands to millions of login attempts in a short period. They often use pre-made lists of commonly used passwords or generate random combinations to find the correct login credentials.<br \/>\nThis type of attack can be particularly effective if no adequate security measures are in place. Examples of such measures include strong password requirements, multi-factor authentication, or systems designed to detect and defend against brute-force attempts.<\/p>\n<h2>In detail: Our new matrix security feature<\/h2>\n<p>Our KVM matrix systems are equipped with a practical security feature that autonomously detects brute-force attacks and automatically locks users after exceeding the set number of failed login attempts.<\/p>\n<ul>\n<li><strong>Automatic lockout:<\/strong> The KVM matrix can be configured by the administrator to lock users after several invalid attempts. This prevents potential attackers from making further access attempts during the lockout period.<\/li>\n<li><strong>Customizable settings:<\/strong> Administrators can adjust the parameters for the number of allowed login attempts and the lockout duration per user to optimize security according to their company\u2019s specific requirements.<\/li>\n<\/ul>\n<h2>Proactive monitoring for maximum security<\/h2>\n<p><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-8072 alignright\" src=\"https:\/\/blog.gdsys.de\/wp-content\/uploads\/2024\/11\/GD_Blogpost_Matrix-Feature_Artikelbild.jpg\" alt=\"\" width=\"404\" height=\"280\" \/>Our matrix systems are equipped with both security features and a monitoring function\u00a0that enables automatic transmission of device status messages to Syslog servers or via SNMP, along with manual monitoring accessible through a web interface. By analyzing the Syslog messages, monitoring tools can detect attacks and issue appropriate alerts. Early detection and notification enable administrators to quickly respond to potential security incidents and take appropriate measures to protect the network. This way, the overall security of the IT infrastructure can be enhanced and protected against threats.<\/p>\n<p><strong>&gt;&gt; Other articles you might be interested in:<\/strong><\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/2024\/05\/13\/flexible-intuitive-dynamic-how-our-new-workplace-module-with-multi-viewing-functionality-sets-new-standards\/\" target=\"_blank\" rel=\"noopener\">Flexible, intuitive, dynamic \u2013 How our new workplace module with multi-viewing functionality sets new standards<\/a><\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/2024\/07\/25\/digital-resilience-insight-into-nis-2-and-how-kvm-strengthens-your-cyber-defenses\/\" target=\"_blank\" rel=\"noopener\">Digital resilience: insight into NIS 2 and how KVM strengthens your cyber defenses<\/a><\/p>\n<div class=\"shariff\" data-title=\"How our new matrix feature protects against brute-force attacks\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/wp-content\/uploads\/2024\/11\/GD_Blogpost_Matrix-Feature_Artikelbild.jpg\" data-url=\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks are a serious threat to businesses worldwide. According to IBM&#8217;s X-Force Threat Intelligence Index, 32% of all attacks last year targeted Europe, with the misuse of valid accounts and phishing each accounting for 30% of incidents. North America moves up to second place, making up 26% of all cases, while Asia-Pacific falls from first &#8230;<\/p>\n","protected":false},"author":14,"featured_media":4507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[19],"tags":[764,743,4,5,341,345,765,766,85,342],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How our new matrix feature protects against brute-force attacks<\/title>\n<meta name=\"description\" content=\"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How our new matrix feature protects against brute-force attacks\" \/>\n<meta property=\"og:description\" content=\"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-26T11:48:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eva Kring\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg\",\"width\":1920,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/\",\"name\":\"How our new matrix feature protects against brute-force attacks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#primaryimage\"},\"datePublished\":\"2024-11-26T11:48:33+00:00\",\"dateModified\":\"2024-11-26T11:48:33+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\"},\"description\":\"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How our new matrix feature protects against brute-force attacks\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\",\"name\":\"Eva Kring\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"caption\":\"Eva Kring\"},\"description\":\"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/\"],\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/evakring\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How our new matrix feature protects against brute-force attacks","description":"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/","og_locale":"en_US","og_type":"article","og_title":"How our new matrix feature protects against brute-force attacks","og_description":"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.","og_url":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2024-11-26T11:48:33+00:00","og_image":[{"width":1920,"height":600,"url":"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Eva Kring","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2024\/11\/GD_Blogpost_Header_Matrix-Feature_1920x600.jpg","width":1920,"height":600},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/","name":"How our new matrix feature protects against brute-force attacks","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#primaryimage"},"datePublished":"2024-11-26T11:48:33+00:00","dateModified":"2024-11-26T11:48:33+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5"},"description":"With automatic user lockout, customizable security parameters, and proactive monitoring, you can effectively protect your IT infrastructure.","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2024\/11\/26\/how-our-new-matrix-feature-protects-against-brute-force-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How our new matrix feature protects against brute-force attacks"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5","name":"Eva Kring","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","caption":"Eva Kring"},"description":"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.","sameAs":["https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/"],"url":"https:\/\/blog.gdsys.de\/en\/author\/evakring\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4506"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=4506"}],"version-history":[{"count":1,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4506\/revisions"}],"predecessor-version":[{"id":4509,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4506\/revisions\/4509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/4507"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=4506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=4506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=4506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}