4. Architecture and configuration
The Vulnerability Management and Compliance (VMC) Module assists in assessing systems in terms of secure configurations and notifies decision makers whenever improvements are needed.
5. Vulnerability Management
VMC is one of the core modules in our CDC activity for Radar Services and is also included in Radar Solutions. This measure is an important element in reducing cyber attack surfaces.
6. Identity and Access Management (IAM)
By linking events from the IAM system of a customer and integrated into the Log Data Pipeline with the results of our log data analysis (LDA) and correlation, we can provide a holistic view of the security status of our customer organisations.
7. Data security
Security is about data. Essential data needs to be stored in a secure and reliable fashion. Security measures are defined in order for your data to be stored on-premise with all necessary technical and organisational measures.
8. Log monitoring
Logging and monitoring are important functions of our security products. They form the basis of our log data analytics technology, which also acts as a SIEM (Security Information and Event Management).
9. Incident management
Our Cyber Defense Center, located in Vienna, is a central point for the detection and management of security incidents that threaten the ongoing operation of facilities. We work closely with our clients to detect and remediate cyber threats.
10. Supply chain security
To me, being a Chief Operations Officer, supply chain security is not as much a technology issue. I see it rather as a matter of governance, partnership and collaboration. As long as there is some form of IT connection between the organization and its supply chain, our product can process traffic from the supply chain as well as the organization’s own and integrate it with our solutions for log data analysis, network behavior or advanced threat detection.
The bottom line of it: Organisations and industries are well advised in incorporating all steps mentioned above into their security plans and rely on a service product such as Radar Services managed through our CDC, or drawing from CDC technology solutions such as RADAR Solutions for an inhouse Cyber Defense Center (or Security Operations Center). Stay safe and secure!