Which technologies are used?
The SOC uses technologies exclusively to protect the RWTH network and its users. The following technologies are implemented to fulfill the SOC tasks:
- Enabling the identification of infected systems,
- Detecting compromised user accounts,
- Detecting and preventing unwanted data leakage and unauthorized changes to data,
- Identifying attacks in a timely manner,
- Detecting network disruptions, such as denial of service (DoS) attacks, and isolating affected systems.