Intrusion Detection

Intrusion Detection services

Log Correlation

Enroll systems to send log files to our centralized logging system for security event monitoring and analysis

Network Intrusion Detection Systems

Intrusion detection systems deployed at the network border automatically detect security incidents

Aggressive IP Distribution (AID) List

Utilize our list of hosts known to be attacking campus systems and proactively stop them at your network or host-based firewall