As part of the defense-in-depth security strategy, ProStratus is not content to assume that firewall protections are enough to thwart attackers. We recognize that hackers are growing more sophisticated and are frequently finding ways to penetrate or circumvent firewalls to find their way past the network defenses of outer boundaries.
We understand that in cybersecurity, the attacker has the advantage and only has to be successful once in order to cripple your organization. That is why we use traffic analysis as a part of our layered defense.
By establishing baselines of behavior and configuring settings for acceptable levels of traffic, ProStratus is able to develop alerts and deploy monitors that will tip us off when something within your network does not seem normal.
What is traffic analysis?
ProStratus will monitor the amount and type of traffic on your network. This includes activity like emails, file transfers and downloads. Both internal and external traffic is logged and monitored so that we can review it while establishing a baseline of normal behavior.
Once that is established, we can set parameters in consultation with you, to determine what would be alarming behavior. Do you not have anyone in the office on the weekends? We can establish alerts that would tell us if someone was moving a lot of files off of the network during downtime.