Fundaments of Computer Space Security
- Read more about Fundaments of Computer Space Security
- Log in to post comments
ProWeb is a web application firewall that protect web applications from attacks, ProWeb can detect all known attacks against web applications and blocks them before they reach customers web applications and has flexible options for logging and reporting. ProWeb uses machine intelligence beside advanced signature-based rule engine to proactively detect known and unknown attacks against web applications. Adaptive leaning of users and applications behavior enables ProWeb to increase detection accuracy in decreasing false positive. ProWeb sends attack alerts to admin by email and SMS and has advanced and detailed reporting with custom search and filtering.
Within this scope, following peculiarities can be taken into account:
Cloud Security Operation Center is a SOC that receives logs and events from cloud platform (virtual switch mirror port and Zabbix). Sitra agent is customized to receive logs and events from OpenStack platform. New correlation rules have been added to Sitra to detect cloud attacks. Sitra is the name of SOC produced by IRISA.
The following features have been added to Sitra:
Within this scope, following services can be taken into account:
Distributed attacks
A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SOC within a building or facility is a central location from where staff supervises the site, using data processing technology. The SOC is responsible for monitoring, detecting, and isolating incidents and the management of the organization’s security products, network devices, end-user devices, and systems. This function is performed seven days a week, 24 hours per day. The SOC is the primary location of the staff and the systems dedicated for this function.
Within this scope, following peculiarities can be taken into account:
Monitoring, detecting, and isolating incidents and the management of the organization's security products, network devices, end- user devices, and systems.