Information security management firm, Digital
Encode, has introduced a monitoring solution that will remotely monitor the
cyberspace of organisations and report or stop unauthorised access to database
in Nigeria.
According to Digital Encode, the monitoring
solution is expected to monitor vulnerable ports, servers, Internet Protocol
(IP) addresses, cyber threat maps, which shows the line of attacks and the
sectors being attacked.
As Information Systems are becoming more complex
and frequently changing, maintaining the global security level of a company has
become critical. The CSOC provides real time attack detection and threat
visibility to protect the cyber space of small, medium and large scale
companies. It conducts behavioural monitoring, threat detection and security
intelligence. The main aim and objective of the CSOC is to assist organisations
in the areas of:
The Chief Technical Officer of Digital Encode,
Oluseyi Akindeinde, said, “the solution, which was developed by the Centre for
Information Security Intelligence (CISI), an arm of Digital Encode, was
necessitated by the growing rate of cyber attacks and cyber espionage leading
to loss of data and money.”
Akindeinde, added that the solution was capable
of monitoring banks’ networks with its threat management system solution. “The
solution comes with installed sensors that give alerts if there is observed
intrusion. Our solution can easily detect attacks and blacklist the IP address
from where the attack emanated from, and thereafter blacklist and block all
illegal transactions from the IP address,” he noted.
The Centre for Information Security Intelligence
(CISI) is a centralised arm of Digital Encode devoted entirely to cyber
defence, combining a Security Operations Centre (CSOC) with an analysis
capability of new and emerging threats and vulnerabilities.
The Chief Operating Officer of Digital Encode,
Wale Obadare, said that the monitoring solution was affordable for big and
small organisations and it is expected to monitor cyberspace of organisations
in order to investigate fraud related issues.
According to him,electronic surveillance and
dynamic monitoring of IT infrastructures and applications (intrusion
monitoring)
No comments:
Post a Comment