INTRUSION DETECTION SYSTEMS

Identify and even prevent intrusion attempts instantly.

IONICA offers robust host and network-based intrusion detection systems to capture malicious activity at every level.

Detailed logging and alerting helps facilitate immediate action from expert engineers — blocking, prevention, and threat analysis.

Record-keeping also enables forensic analysis and chain of custody for internal and external investigations.

Some of the types of attack and reconnaissance we can detect:

  • Log -in attempts
  • Vulnerability scans
  • Port scans
  • Unauthorised configuration or file changes
  • Unauthorised service restarts or changes
  • Unauthorised or unusual system user activity
  • Creation of new system users
  • Installation of malicious programs or files
  • Malicious processes
  • Other malicious network activity