Security monitoring and supervision
Evaluation of all relevant data from previously autonomous sources (e-mail, applications, file system, web, network, …).
Main benefits
It focuses primarily on business, not IT. It’s a service, not a product. You only pay what you draw. The initial investment in implementation works is minimal. For users, the service is transparent – the end user does not have to interact with the technology in any way. Our service does not burden and slow down the IT infrastructure, on the customer’s side it is only passive collection of information. Computationally demanding analysis takes place only in our supervisory centre.
Overview
Protection
Information
Internal protection
Effective measures
Functional archiving
Effective analysis
Verification of measures in place
Detecting weaknesses
Provided services
Today, the operation of business processes and processing of business data is largely automated through IT. IT operations are monitored through event logs. Until now, this data has only been used to control IT activities and to re-diagnose operational statuses.
However, by deeper analysis and mining of all relevant information, we can obtain not only information about the IT status, but also valuable information about the behaviour of the surroundings. Every action of users and eventual attackers will leave its imprint on corporate IT precisely in the form of event logs.
The principle of the service therefore consists in evaluating all relevant data from previously autonomous sources (e-mail, applications, file system, web, network, …). Only in this way, one may evaluate the course of business processes and identify security events and incidents and respond in timely manner.