Security Instruction Platform

The DARWIN software solution generates precise instructions for a security operations center (SOC) from security infrastructure alerts. The model is based on artificial intelligence, which continuously learns from experience and refines the system. DARWIN correlates, evaluates and identifies courses of action for an immense number of security-relevant log entries from various sources. Staff working for the Telonic SOC or the client itself are responsible for implementation. New alerts without specific instructions are analyzed by the Telonic Computer Emergency Response Team (T-CERT) and given a course of action in DARWIN.

This means that DARWIN gradually develops into a client-specific knowledge base. Security experts no longer have to spend vast amounts of time identifying steps for how to follow up on an alert, as this process is replaced by a secure, reliable and highly precise automated system for the SOC.

Against attacks from outside and inside: Vectra Networks

Those who safeguard themselves against attacks from outside should not disregard the risks from within their own company.

Read more

A cloud-based application: Riverbed

Business life is becoming increasingly mobile and security-critical applications can also be stored in the cloud.

Read more

Compliance is under control with LOGPOINT

Unusual and security-critical incidents in a network often remain undiscovered.

Read more

Telonic is flexible, personal and service oriented.

A network with reliability, performance and proactive monitoring for your business success.
With the best products and technologies of our partners and the knowledge and experience of nearly 40 years of system house history, we meet the requirements of your network.

We are partners of the top manufacturers in IT