Check-out our new look and give us some feedback!

Tag: Intrusion Detection

Reading Time: 4 minutes

The security of your network is of the highest priority, and an attack on your network could cost your business thousands, or even millions, of dollars. An intrusion detection system is one such system that can be used to monitor your network and receive alerts when suspicious activity is detected. In this article, we will explain what an intrusion detection system is and how it works.

Continue reading →
Reading Time: 5 minutes

Introduction

This article will review some of the more technical aspects of F5 Distributed Cloud AIP. F5 Distributed Cloud AIP is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.

Continue reading →
Reading Time: 4 minutes

Introduction

Microsoft Exchange Security Update
   

In this article, we provide updated information concerning the ongoing threat posed by the malware directed at Microsoft Exchange Servers noted in CVE-2021-26855. We also furnish the steps needed to update and secure your Microsoft Exchange Server. In a recent post, the Cybersecurity & Infrastructure Security Agency posted a priority security advisory regarding the recent Microsoft Exchange Server vulnerability. They state:

Continue reading →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434