Defensive information operations and computer intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical information infrastructures. The automated detection and immediate reporting of these events are required to respond to information attacks against networks and computers.
STATE OF THE ART DETECTION
We proud ourselves by using state of the art technology in our IDS Sensors. We run our own special customized version of Suricata together with a set of self-developed tools and detection signatures. This is all a connected together with the powerful CENTRY Security Platform and our specialized team of security experts in our Security Operations Center.
CENTRY IDS provides full visibility over your systems. By monitoring all the traffic that goes trough your network we can detect the full range of threats that threatens your system.
ADAPTED TO YOUR SYSTEM
CENTRY IDS is developed to fit into systems ranging from a small to and Enterprise setups. The IDS node comes in multiple different versions, each adapted to fit your need:
- Small Hardware node
- Medium Hardware node
- Enterprise hardware Node
- Virtual Machine
- Physical Machine
CENTRY IDS is managed and controlled from our own CENTRY Security Platform. The platform gives you easy access to all your information and shows you a good overview of all your security alerts from the sensors deployed at your location.