Case Study

Cyber Attack Measures  

Government

For Cyber Attack Measures, the existing firewall and proxy logs were export to EVA for:

– Signs of potential Cyber Attack
– Signs of potential Data Leakage
© 2021 IIJ GLOBAL SOLUTIONS SINGAPORE PTE. LTD. ALL RIGHTS RESERVED.
© 2021 IIJ GLOBAL SOLUTIONS SINGAPORE PTE. LTD.
ALL RIGHTS RESERVED.

Navigation Menu

External Links