Skip to main content
Network Security
- Data leakage (misused DNS, SSH, HTTP(s), …)
- Anomalous data transfer
- Anomalous internal file transfers
- Preparation for data theft by an employee and other internal threats
- Tunneled traffic (ICMP, DNS, SSH, HTTP(s), …)
- Automatic data harvesting (e-shop)