Technology

  • Ensuring adequate infrastructure security
  • Ensuring Network segmentation
  • Implementing logging of critical processes
  • Implementing central monitoring of security incidents
  • Deactivating or discontinuing
  • IT services under attack
  • Technology Solutions for data sources, the Security Intelligence Platform, and case management