- Identify misconfigured firewalls
- Catch attacks that firewalls legitimately allow through (such as attacks against Web servers)
- Document hacker attempts that fail
- Watch for insider hacking
- Identify users installing unsecured software on their machines
- Recognize unauthorized machines using the network
- See incorrect IP space utilization
Treasure Valley IT will ensure your intrusion detection and vulnerability scanning system is properly installed and maintained. This includes configuring the system, testing the pattern matching, updating scanning profiles, monitoring 24/7, reporting suspicious activities or vulnerability, and providing a monthly report.