Identify, Block threats + Become compliant:
• Port scans, host scans, denied scans, sudden change of traffic between certain IPs or anomalies in traffic
• Network server/device and admin log on anomalies– authentication failures at all times and unusual IPs
• Network access irregularities from VPN, wireless log ons and domain controllers
• Account lockouts, password scans and unusual log on failures
• Rogue endpoints, wireless access points
• Bot-nets, mail viruses, worms, DDOS and other “zero day” malware identified by cross-correlating DNS, DHCP, web proxy logs and flow traffic
• Abnormalities in web server and database access. Become compliant with most regulations such as: PCI-DSS, SOX, GLBA, FDIC, HIPAA
• Full Log management: long term storage, archival and retrieval
• Raw log storage, archival and retrieval
• Event Log Correlation and Threat Intelligence
• Log and alert analysis
• 7 year log retention policy
• Infosec incident report
• Executive Summary and Compliance report • 100% US based • SOC 2 Certified