Identify and even prevent intrusion attempts instantly. IONICA offers robust host and network-based intrusion detection systems to capture malicious activity at every level. Detailed logging and alerting helps facilitate immediate action from expert engineers — blocking, prevention, and threat analysis. Record-keeping also enables forensic analysis and chain of custody for internal and external investigations.
Some of the types of attack and reconnaissance we can detect:
- Log -in attempts
- Vulnerability scans
- Port scans
- Unauthorised configuration or file changes
- Unauthorised service restarts or changes
- Unauthorised or unusual system user activity
- Creation of new system users
- Installation of malicious programs or files
- Malicious processes
- Other malicious network activity