Managing today’s IT systems becomes increasingly complicated with the deployment of rapidly growing cloud computing services and virtualized environments.
New cyber threats, using advanced technics need a new IT security approach.
The proof of the pudding is in the eating. Or whether the the security measures are acting as expected and the defensive strategy has no unexpected gaps can only be proven by extensive testing.
There is no single solution for effectively monitoring and detecting security events in an IT infrastructure.
Our approach is based on a combination of signature and anomaly methods together with distributed processing.
It is essential to analyze network traffic (near) real time and reach decisions based on alarms when avoiding serious security breaches.