Analysis
Managing today’s IT systems becomes increasingly complicated with the deployment of
rapidly growing cloud computing services and virtualized environments.
New cyber threats, using advanced technics need a new IT security approach.
Testing
The proof of the pudding is in the eating. Or whether the the security measures are acting as expected and the defensive strategy has no unexpected gaps can only be
proven by extensive testing.
Monitoring
There is no single solution for effectively monitoring and detecting security events in an IT infrastructure.
Our approach is based on a combination of signature and anomaly methods together with distributed processing.
It is essential to analyze network traffic (near) real time and reach decisions based on alarms when avoiding serious security breaches.