Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Threat Detection & Hunting

Key Facts

  • Managed Intelligence
  • Managed Visibility
  • Managed Analytics

Product Description

Optimal recognition Armed with a comprehensive set of indicators and rules, we recognise attacks at an early stage. We do not just rely on open source and commercial partners. Rather, we enrich that information with knowledge from our own threat intelligence and information provided by the DCSO community and our network. Best possible visibility and transparency Corporate networks are constantly the focus of professional attackers seeking to commit industrial espionage or sabotage. In order to defend your resources successfully, you need to ensure the visibility of your own data traffic and detect movement between infected systems (lateral movement). These are decisive factors. We inform you in the case of an incident Relieve strain on your SOC (Security Operations Centre) with our Managed Security Service and a superior sensor system installed at central nodes of the network infrastructure. We lay the groundwork to make sure that the relevant data traffic remains transparent. If an alarm is triggered, our analyst backend evaluates and filters false alarms, rates the criticality and urgency of the alarm, and generates a comprehensive report. That way, you can stay best informed about specific observations and affected systems and receive appropriate recommendations for action.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.