Search
back to search
NAME

Cybersecurity and Network Monitoring Lab

DESCRIPTION

Cybersecurity and network monitoring laboratory offers access to SMEs to advanced cybersecurity tool and service series in the industrial and corporative field, to improve employees training as well as to perform compatibility and interoperability trials of different cybersecurity solutions with their products and systems.

MOST OUTSTANDING EQUIPMENT AND COMPONENTS

Equipped space for the performing of training sessions and for the execution of efficiency and ability evaluation trials of the integrated tools, in addition to the monitoring and tracking of attacking mocks. The room has capacity for 10 people, 2 projectors, additional screens in all work places and access to laboratory tools.

These are high efficiency devices designed for improve significantly network’s security by supervising network’s traffic and exporting flux information which can be collected and analysed.
- Supports Netflow v5, v9, IPFIX, sFlow and JFlow protocols.
- 100% Package capture flux and/or sampled flux generation.
- Personalised templates to export traffic information.
- Package (DPI) detailed checking function.
- SNMP y Syslog compatibility.

There are high efficiency IPS/IDS intrusion sounding lines designed for providing an easy, scalable and flexible way to protect the network:
- 10G connectivity.
- Acceleration through Hardware.
- Bypass LAN or connection failure ability.
- Frontal connectivity.
- Superfluous feeding sources.

SOC supported by RedBorder Platform:
- Traffic analyser: Netflow v5, v9 IPFIX, sFlow collectors, DPI analysis, anomalies, Malware, DLP, vulnerabilities, geolocation. For wired and Wireless network.
- Intrusion: SNORT IDS/IPS display, Centralised managing, Signing politics, anomalies, attacks. Geoblocking and Reputation. Personalised rules. Hierarchy politics. Multiple sources.
- Correlation Engine: allows any analysis by combining any rule. Detects anomalies and performance.
- Vault (SIEM): Treatment, normalization and Logs’ storage. Performance analysis. HW/SW actives integration.
- Infrastructure monitor: hardware monitoring through SNMP, Redfish, bulk-stats.
- Mobility: Integration using suppliers’ APIes. Interior location. Location analytics.

SERVICES OFFERED BY THE ASSET

services book icon
1194

Cybersecurity tools’ demonstrations

services book icon
1193

Interoperability trial service

services book icon
1192

Training in cybersecurity and specific solutions

ENTITY MANAGING THE ASSET

ASOCIACIÓN DE EMPRESAS TECNOLÓGICAS INNOVALIA

Contact person: Jesus Alonso

Other related assets

Tell us about your need

Let us get to know you better. If you are looking to implement intelligent technologies and advanced materials that improve the efficiency of your company's production system to offer solutions with more added value, fill in this form.

Scroll To Top