Cyber Hygiene Status and APT Detection
This service is based on the data coming from the botnets of the systems within the institution, the zombie systems, the tools used for data leakage, the systems where remote unauthorized access programs are installed, the backdoors, the trojan-infected systems, and the data coming from the cyber threat intelligence network. detected and reported.
For Cyber Hygiene Status and APT detection, a total of 30,000 anomaly rules and special systems with 200,000,000 categorized domains in the database are used. Depending on the requested service level, the traffic obtained is controlled in six different APT and Antimalware systems, minimizing the error rate (false positive – false negative).
NarDC Teklif Formu
How is Cyber Hygiene Status and APT Determined?
With the Cyber Hygiene Map and the "Targeted Cyber Attack (APT) Detection Service", the corporate network will be monitored for a month, reporting unauthorized access to their systems and installed malicious software, and performing cyber security studies to detect APTs.p>
However, depending on preference, network traffic analysis can be done live or offline by placing a sensor on the system. After the in-house sensors are installed and configured within the scope of the service process, the traffic analysis process is started. As a result of the analysis studies, a report is made and an action list is presented.