Anomalous Data Transfer or Data Leak
Data leakage (misused DNS, SSH, HTTP(s), …)
Anomalous data transfer
Anomalous internal file transfers
Preparation for data theft by an employee and other internal threats
Tunneled traffic (ICMP, DNS, SSH, HTTP(s), …)
Automatic data harvesting (e-shop)
Do you have any question?
Please leave us your contact details so we can deliver a personalized offer tailored to your company’s needs.