You are located in service: Security Operation Center (SOC)

Which technologies are used?

Which technologies are used?

Kurzinformation

 

The SOC uses technologies exclusively to protect the RWTH network and its users. The following technologies are implemented to fulfill the SOC tasks:

  • Enabling the identification of infected systems,
  • Detecting compromised user accounts,
  • Detecting and preventing unwanted data leakage and unauthorized changes to data,
  • Identifying attacks in a timely manner,
  • Detecting network disruptions, such as denial of service (DoS) attacks, and isolating affected systems.

last changed on 10/22/2024

How did this content help you?

Creative Commons Lizenzvertrag
This work is licensed under a Creative Commons Attribution - Share Alike 3.0 Germany License