Intrusion Detection

Intrusion Detection services

Aggressive IP Distribution (AID) List

Aggressive IP Distribution (AID) List
Utilize our list of hosts known to be attacking campus systems and proactively stop them at your network or host-based firewall

Network Intrusion Detection Systems

Network Intrusion Detection Systems
Intrusion detection systems deployed at the network border automatically detect security incidents

Log Correlation

Log Correlation
Enroll systems to send log files to our centralized logging system for security event monitoring and analysis