top of page

What Cyberattack problems can we resolve?

  • Servers under Ransomware attacks

  • Servers under DDOS attacks

  • Servers under SPYWARE attacks

  • Servers under MALWARE attacks

  • Servers under BOTNET attacks

  • Servers under BLACKLIST attacks

  • Servers under REMOTE_HACKING attacks

  • Servers under PHISHING attacks

  • Servers under MitM attacks

  • Servers under SQL_INJECTION attacks

  • Servers under XSS attacks

  • Servers under APT attacks

  • Servers under CREDENTIAL_ATTACK attacks

  • Servers under EXPLOITS attacks

  • Servers under DNS_SPROOFING attacks

  • Servers under ARP_SPROOFING attacks

  • Servers under CLICKJACKING attacks

  • Servers under DRIVE_BY_DOWNLOAD attacks

  • Servers under WATERING_HOLE_ATTACK attacks

  • Servers under MALVERTISING attacks

  • Servers under CRYPTOJACKING attacks

Where can we monitor Cyberattack problems?

  • Monitoring servers in the 2-Tiers Data Center

  • Monitoring servers in the 3-Tiers Data Center

  • Monitoring Virtual Server in the VMWare Private Cloud

  • Monitoring Virtual Server in the VMWare Public Cloud

  • Monitoring Virtual Server in the Google Public Cloud

How do we monitor your Cyberattack problems?

  • Packet Flow:  We monitor Internet Incoming traffic to the data center by having the MacroProbe TAP on the spanned switch port in the 2-tiers or 3-tiers at the front-end and/or the application logistic and/or the back-end.  In case of the Cloud, we monitor the Internet Incoming traffic by having the MacroProbe TAP into the mirror ports on the vSwitch in the case of VMWare or the VPC in case of Google Cloud.   

  • Event logs:  On each of the servers monitor, we also installed the Eventlog Inspector to export the Windows Event Logs to our MacroProbe for analysis in combination with the packet flow data.  

  • Port Scan:  We also scan the open ports on servers monitor for any vulnerability.

We monitor the following Cyberattack metrics:

  • Event logs analysis for CyberAttack on the Servers  

  • Port Scan analysis on Open Port Vulnerabilities on the Servers  

  • Response Time for TCP Applications for impact effects on the Servers

What MacroProbe features do we use to monitor your Cyberattack?

  • Big Cyberattack Monitor

  • Big DDOS Monitor

  • Big Governance Monitor

  • DDOS Monitor

  • BOTNET Monitor

  • Blacklist Monitor

  • CyberIntel Ai

  • DDOS Anomaly Detection

  • BOTNET Anomaly Detection

  • Blacklist Anomaly Detection

  • Remote Hacking Anomaly Detection

  • DDOS Forecast

  • BOTNET Forecast

  • Blacklist Forecast

  • Remote Hacking Forecast

Cyberattack Deployments:

2 Tier Data Center Monitoring

3 Tier Data Center Monitoring

Cloud Monitoring

bottom of page