Mission Control Intrusion Detection

The Intrusion Detection service protects an organization's network at the perimeter and is one of the building blocks of a robust infrastructure. The network traffic is scanned continuously and key personnel are alerted if there is a security breach. The Intrusion Detection service uses a combination of protocol and signature inspection methods to analyze network traffic and detect network threats, making it possible to respond to suspected intrusions quickly. Mission Control engineers first analyze the generated alerts, so that the notifications that are sent to customers have a maximum significance and guarantee improved security with reduced management overhead.


An important component for the reliability and relevance of an intrusion detection system is the customer feedback loop implemented in the detection and notification framework. The Intrusion Detection service is capable of representing individual infrastructure constellations, because it is adjusted according to direct input from the customer base, as well as according to inputs generated by the Mission Control Operations Centers.

 

An intrusion detection system is more relevant and reliable when the bulk of events are filtered. Security professionals analyze the most relevant events and discuss them with key personnel.
An intrusion detection system is more relevant and reliable when the bulk of events are filtered. Security professionals analyze the most relevant events and discuss them with key personnel.

Intrusion detection statistics in the Mission Control Portal.
Intrusion detection statistics in the Mission Control Portal.

Log viewer that lists all events for intrusion detection. Events can be sorted and filtered by various criteria. A double-click on a row opens the event details.
Log viewer that lists all events for intrusion detection. Events can be sorted and filtered by various criteria. A double-click on a row opens the event details.

Page from an executive management report of intrusion detection, showing a monthly overview of logged event categories.
Page from an executive management report of intrusion detection, showing a monthly overview of logged event categories.
Go to top