Cyber Threat Monitoring System
Cyber Threat Monitoring System (CTMS) is the perfect solution to help manage the flood of information and analyze it in real-time to find evidence of security incidents. It accelerates and simplifies threat detection, incident response, and compliance management for the IT team with limited resources.
Business Benefits
Security Capabilities
- • IT Asset Discovery
- • Host Behavioral Monitoring
- • Vulnerability Assessment
- • File Integrity Monitoring
- • CIS Control Assessment
- • Windows Security Event Monitoring
- • Network Intrusion Detection
- • Centralized Log Management
- • Host Based Intrusion Detection
- • Cyber Threat Detection
- • Security Alert and Notification
- • Rootkit Detection
- • Security Information and Event Management
- • Management Report
Our Approach
Hardware Required
- • Memory - 32 GB RAM
- • Central Processing Unit - 16 cores
- • Network Interface (Span port required) - 2 Network Interface 1 Gigabit Ethernet
- • Appliance Disk Storage (SSD Preferable) - 10 TB
- • Log Storage (NAS) - 4 TB
- • Virtual Machine Support