Network Security
  • Data leakage (misused DNS, SSH, HTTP(s), …)
  • Anomalous data transfer
  • Anomalous internal file transfers
  • Preparation for data theft by an employee and other internal threats
  • Tunneled traffic (ICMP, DNS, SSH, HTTP(s), …)
  • Automatic data harvesting (e-shop)