Q2 2018

Network-based Intrusion Detection (NIDS)

08.05.2018, 11 a.m. (GMT+2)

Network traffic from and to the Internet is analysed in real-time in order to detect suspicious patterns and anomalies such as malware, command and control server, bots, spyware, drive by sources, DDoS targets and sources and others.

Continuous network scanning for your security.

  • 5 basic rules for the purposeful deployment
  • 5 best practices for higher effectiveness and efficiency

Vulnerability Management & Assessment (VAS)

17.04.2018, 11 a.m. (GMT+2)

VAS includes continuous and highly accurate internal and external vulnerability scans for a 360-degree view. Besides fast and efficient authenticated or non-authenticated vulnerability scans, open ports, the use of potential unsecure or unnecessary services on these ports as well as shares and non-secure shares are detected.

Detect the weak spots in your IT infrastructure!

  • 5 basic rules for the purposeful deployment
  • 5 best practices for higher effectiveness and efficiency

Security Information & Event Management (SIEM)

10.04.2018, 11 a.m. (GMT+2)

Central to a SIEM is the collection and analysis of logs from various sources within a network (e.g. server, clients, network devices, firewalls, applications) for security-relevant information and events.

Though what’s really relevant to your IT security out of millions of events?

  • 5 basic rules for the purposeful deployment
  • 5 best practices for higher effectiveness and efficiency