Are you ready for your Hack Attack

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_heading tag=’h2′ padding=’10’ heading=’Take Preventative Action Now’ color=’custom-color-heading’ style=’blockquote modern-quote modern-centered’ custom_font=’#af0000′ size=” subheading_active=” subheading_size=’15’ custom_class=”][/av_heading]

[av_image src=’https://www.sobavigor.co.za/wp-content/uploads/2016/10/Are-you-ready-for-your-Hack-Attack-300×141.jpg’ attachment=’110′ attachment_size=’medium’ align=’center’ styling=” hover=” link=” target=” caption=” font_size=” appearance=” overlay_opacity=’0.4′ overlay_color=’#000000′ overlay_text_color=’#ffffff’ animation=’no-animation’][/av_image]

[av_heading tag=’h3′ padding=’10’ heading=’Anomaly Detection from FlowMon’ color=” style=’blockquote modern-quote modern-centered’ custom_font=” size=” subheading_active=’subheading_below’ subheading_size=’15’ custom_class=”]
Detection methods include
[/av_heading]
[/av_one_full]

[av_one_half first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_textblock size=” font_color=” color=”]

  • Consistency check of input data.
  • Detection of infected devices.
  • Detection of dictionary attacks on network services.
  • Anomalies of email communication and outgoing SPAM.
  • Port scanning.
  • Anomalies of DNS traffic.
  • Telnet misuse.

[/av_textblock]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]
[av_textblock size=” font_color=” color=”]

  • Anomalies of ICMP traffic.
  • Unavailable services.
  • High data transfers.
  • Anomalies in traffic at the network layer.
  • DoS/DDoS attacks including so-called reflection/amplification attacks.
  • Communication with potentially unsafe IP addresses including honeypot communication.
  • Repeated Password Attempts

[/av_textblock]
[/av_one_half]

[av_one_full first min_height=” vertical_alignment=” space=” custom_margin=” margin=’0px’ padding=’0px’ border=” border_color=” radius=’0px’ background_color=” src=” background_position=’top left’ background_repeat=’no-repeat’ animation=” mobile_display=”]

[av_heading heading=’and so much more – take action now!’ tag=’h3′ style=’blockquote modern-quote modern-centered’ size=” subheading_active=” subheading_size=’15’ padding=’10’ color=” custom_font=”][/av_heading]

[av_button_big label=’Contact Us to arrange a trial’ description_pos=’below’ link=’page,49′ link_target=” icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ custom_font=’#ffffff’ color=’theme-color’ custom_bg=’#444444′ color_hover=’theme-color-subtle’ custom_bg_hover=’#444444′][/av_button_big]

[/av_one_full]