Intrusion Detection

Defensive information operations and computer intrusion detection systems are primarily designed to protect the availability, confidentiality and integrity of critical information infrastructures. The automated detection and immediate reporting of these events are required to respond to information attacks against networks and computers.

ids-1_web

STATE OF THE ART DETECTION

We proud ourselves by using state of the art technology in our IDS Sensors. We run our own special customized version of Suricata together with a set of self-developed tools and detection signatures.  This is all a connected together with the powerful CENTRY Security Platform and our specialized team of security experts in our Security Operations Center.

FULL VISIBILITY

CENTRY IDS provides full visibility over your systems. By monitoring all the traffic that goes trough your network we can detect the full range of threats that threatens your system.

ids-2_web
ids-4_web

ADAPTED TO YOUR SYSTEM

CENTRY IDS is developed to fit into systems ranging from a small to and Enterprise setups. The IDS node comes in multiple different versions, each adapted to fit your need:

  • Small Hardware node
  • Medium Hardware node
  • Enterprise hardware Node
  • Virtual Machine
  • Physical Machine

ONE PLATFORM

CENTRY IDS is managed and controlled from our own CENTRY Security Platform. The platform gives you easy access to all your information and shows you a good overview of all your security alerts from the sensors deployed at your location.

ids-3_web
Do you want more information?
Please contact us today.
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt