You are located in service: Security Operation Center (SOC)

Which technologies are used?

Which technologies are used?

Information

The SOC uses technologies exclusively to protect the RWTH network and its users. The technologies are implemented to fulfill the following SOC tasks:

  • Enabling the identification of infected systems
  • Detecting compromised user accounts
  • Detecting and preventing unwanted data leakage and unauthorized changes to data
  • Identifying attacks in a timely manner
  • Detecting network disruptions, such as denial of service (DoS) attacks, and isolating affected systems

last changed on 09/25/2025

How did this content help you?

Creative Commons Lizenzvertrag
This work is licensed under a Creative Commons Attribution - Share Alike 3.0 Germany License