Against attacks from outside and inside: Vectra Networks

Those who safeguard themselves against attacks from outside should not disregard the risks from within their own company. Employees can also be a security risk.

28 percent of all cases of cyber crime come from within, a study by Carnegie Mellon University has revealed. Vectra Networks‘ products are specialized in identifying these risks. The latest security research and machine learning are united to create an innovative combination of real-time detection and community threat analysis.

Any attackers who are successful in hacking into a network must be exposed. The Vectra X-series platform, as a first system, provides a new level of intelligence and automation and can already detect a cyber attack as it is taking place, as well as tracking the actions of the attacker. In addition, the Vectra platform observes, in each case, the typical patterns of the network traffic and over time gets to know the company and its network tasks. In case that network activities do not match to these parameters, they are immediately identified as abnormal and tracked.

The platform automatically prioritizes attacks that pose the biggest risk. In this way, resources can be sensibly deployed even in the case of multiple attacks.

The solution works on this around the clock in real-time, as opposed to just carrying out selective scans. As a result, the system gets to know the network behavior over 14 hours, and anomalies become apparent even more swiftly, so the necessary countermeasures can be initiated immediately. Vectra is thus always a step ahead, as not only individual known risks are examined, but rather all actions are checked for plausibility against the general network activity. Hence an attack can be stopped as it takes place!

Against attacks from outside and inside: Vectra Networks

Those who safeguard themselves against attacks from outside should not disregard the risks from within their own company.

Read more

A cloud-based application: Riverbed

Business life is becoming increasingly mobile and security-critical applications can also be stored in the cloud.

Read more

Compliance is under control with LOGPOINT

Unusual and security-critical incidents in a network often remain undiscovered.

Read more

NONSTOP NETWORKING -
Telonic is flexible, personal and service oriented.

A network with reliability, performance and proactive monitoring for your business success.
With the best products and technologies of our partners and the knowledge and experience of nearly 40 years of system house history, we meet the requirements of your network.

We are partners of the top manufacturers in IT