by Petra | Aug 29, 2023 | Solution descriptions
Running and operating a data center keeps getting more challenging, particularly from a cybersecurity perspective. This solution description provides you with the tools you need to manage them in a secure manner. The ever-increasing need for networking with external...
by Petra | Aug 29, 2023 | Solution descriptions
The risk of attacks against ICCP servers is high and can have severe implications. Protecting the ICCP server mitigates the attacker’s possibility to propagate the attack over the network and special solutions are needed to do so. Different attack scenarios are...
by Petra | Aug 29, 2023 | Solution descriptions
Geographic Information Systems (GIS) can integrate with, and retrieve data from, systems for supervisory control and data acquisition (SCADA). However, there is a risk that Operational Technology (OT) systems and their operations can be disrupted by threat agents...
by Petra | Aug 29, 2023 | Solution descriptions
Many organisations depend on information exchange with remote sites. Communication between the main office at one location and a small office somewhere else is needed. These offices are connected using the Internet, but sending confidential or sensitive information on...
by Petra | Aug 29, 2023 | Solution descriptions
Zabbix is an open-source software used to monitor IT equipment such as servers, network equipment, virtual machines, etc. In an installation with Zabbix, there are Zabbix proxies with the task of collecting information from its nearby equipment and to forward this...
by Petra | Aug 29, 2023 | Solution descriptions
Do you use Splunk for log collection? Do you want to separate the log collection systems from the monitored systems? By placing a data diode between Splunk Forwarder and Splunk HEC (HTTP Event Collector), it is ensured that this communication is strictly one-way and...