Which technologies are used?
The SOC uses technologies exclusively to protect the RWTH network and its users. The technologies are implemented to fulfill the following SOC tasks:
- Enabling the identification of infected systems
- Detecting compromised user accounts
- Detecting and preventing unwanted data leakage and unauthorized changes to data
- Identifying attacks in a timely manner
- Detecting network disruptions, such as denial of service (DoS) attacks, and isolating affected systems