{"id":2455,"date":"2024-11-21T09:44:55","date_gmt":"2024-11-21T08:44:55","guid":{"rendered":"http:\/\/www.dynacon.pl\/?page_id=2455"},"modified":"2024-12-09T14:37:02","modified_gmt":"2024-12-09T13:37:02","slug":"aric-network-defense-system","status":"publish","type":"page","link":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/","title":{"rendered":"ARIC Network Defence System"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.3&#8243; woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;left-top&#8221; woodmart_css_id=&#8221;67164a0cbdcc9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NGEwY2JkY2M5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXRvcCI6Im9weCJ9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; css=&#8221;.vc_custom_1729514036844{margin-top: -80px !important;background-image: url(http:\/\/www.dynacon.pl\/wp-content\/uploads\/2023\/12\/dynacon-bgr.jpg?id=263) !important;}&#8221;][vc_column][vc_row_inner content_placement=&#8221;middle&#8221; woodmart_css_id=&#8221;66ed3c822936b&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmVkM2M4MjI5MzZiIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsicGFkZGluZy10b3AiOiIzMHB4IiwicGFkZGluZy1ib3R0b20iOiIwcHgifX19&#8243; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner css=&#8221;.vc_custom_1726823213130{padding-top: 100px !important;padding-bottom: 80px !important;}&#8221; woodmart_css_id=&#8221;66ed3b2a2db42&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmVkM2IyYTJkYjQyIiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnsicGFkZGluZy10b3AiOiIyMHB4In0sIm1vYmlsZSI6eyJwYWRkaW5nLXRvcCI6IjBweCIsInBhZGRpbmctYm90dG9tIjoiMHB4In19fQ==&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;&#8221; woodmart_color_scheme=&#8221;light&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h1>ARIC Network Defence System<\/h1>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; css=&#8221;.vc_custom_1732181553067{padding-top: 2% !important;background-color: #FFFFFF !important;border-color: #EEEEEE !important;}&#8221; woodmart_css_id=&#8221;673efdec8e010&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNlZmRlYzhlMDEwIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column woodmart_css_id=&#8221;673ef7d2bbc87&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNlZjdkMmJiYzg3Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;][vc_row_inner content_placement=&#8221;middle&#8221; woodmart_css_id=&#8221;673efa7403c5e&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNlZmE3NDAzYzVlIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/2&#8243; woodmart_css_id=&#8221;673ef68abfd60&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNlZjY4YWJmZDYwIiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h2>SIEM \u2013 Security Information and Event Management SIEM<\/h2>\n<h3><span style=\"color: #0f705a;\">in the ARIC NDS ecosystem was created in 2003.<\/span><\/h3>\n<p>The system, using an intuitive graphical interface, allows you to start working very quickly right after installation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1732181729306{margin-right: 5% !important;margin-left: 5% !important;}&#8221; woodmart_css_id=&#8221;673efeda834b4&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNlZmVkYTgzNGI0Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXJpZ2h0IjoiMSUiLCJtYXJnaW4tYm90dG9tIjoiMyUiLCJtYXJnaW4tbGVmdCI6IjElIn19fQ==&#8221; wd_z_index=&#8221;no&#8221;][vc_single_image image=&#8221;527&#8243; img_size=&#8221;full&#8221; css=&#8221;.vc_custom_1732181044221{margin-bottom: 0px !important;}&#8221; parallax_scroll=&#8221;no&#8221; woodmart_inline=&#8221;no&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; css=&#8221;.vc_custom_1732182180879{margin-top: 5% !important;background-color: #eff2f4 !important;}&#8221; woodmart_css_id=&#8221;673f00a08ac45&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNmMDBhMDhhYzQ1Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column woodmart_css_id=&#8221;66ebe74dba867&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmViZTc0ZGJhODY3Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;][vc_row_inner equal_height=&#8221;yes&#8221; content_placement=&#8221;top&#8221; gap=&#8221;35&#8243; woodmart_css_id=&#8221;673f00aae3940&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzNmMDBhYWUzOTQwIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1727440483793{padding-right: 5% !important;padding-left: 5% !important;background-color: #ffffff !important;border-radius: 15px !important;}&#8221; woodmart_css_id=&#8221;66f6a65e07409&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2YTY1ZTA3NDA5Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXJpZ2h0IjoiMyUiLCJtYXJnaW4tbGVmdCI6IjMlIn19fQ==&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;.vc_custom_1727431235751{margin-bottom: 7% !important;}&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h3>Threats to business continuity come from many sources and are directed at various goals. Among others:<\/h3>\n<p>[\/vc_column_text]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707bdcee0d6e\" class=\" wd-rs-6707bdcee0d6e wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560606384\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-1.svg\" title=\"list-1\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Network threats<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Targeting networks and network infrastructure.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707be63dc705\" class=\" wd-rs-6707be63dc705 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560746288\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-1.svg\" title=\"list-1\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Host threats<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Targeted at individual hosts.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707be5a5d535\" class=\" wd-rs-6707be5a5d535 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560738197\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-1.svg\" title=\"list-1\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">External threats<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Coming from outside attackers.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707be6ce06ca\" class=\" wd-rs-6707be6ce06ca wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560757408\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-1.svg\" title=\"list-1\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Internal threats<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Coming from inside attackers.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[vc_column_text css_animation=&#8221;none&#8221; css=&#8221;.vc_custom_1727428078371{margin-top: 2% !important;}&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h6>While the goal of security solutions is to detect and prevent such threats, no network can be completely secure against all of them. For this reason, SIEM itself focuses on mitigating risk, identifying vulnerabilities, detecting threats, and prioritizing responses to threats and vulnerabilities of the highest severity.<\/h6>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1727440427909{margin-right: 2% !important;margin-left: 2% !important;padding-top: 5% !important;}&#8221; woodmart_css_id=&#8221;66f6a6275559e&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2YTYyNzU1NTllIiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h3>Risk mitigation, vulnerability identification and threat detection measures include:<\/h3>\n<p>[\/vc_column_text]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707beb7e56bc\" class=\" wd-rs-6707beb7e56bc wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560833029\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Identifying patterns of events that indicate a possible threat or vulnerability.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707bec25e348\" class=\" wd-rs-6707bec25e348 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560839205\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Determining the risk of potentially harmful attacks or compromises.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707bec8b45f6\" class=\" wd-rs-6707bec8b45f6 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560846109\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Implementing controls to address reported security vulnerabilities.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707becf475b0\" class=\" wd-rs-6707becf475b0 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560852012\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Ongoing monitoring and reporting of network and host activities.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707bed58d332\" class=\" wd-rs-6707bed58d332 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728560858733\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 25px;height: 25px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"25\" height=\"25\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Taking action in response to identified attacks.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1727440599565{margin-top: 3% !important;background-color: #0f705a !important;border-radius: 15px !important;}&#8221; woodmart_css_id=&#8221;66f6a6d334555&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2YTZkMzM0NTU1Iiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXJpZ2h0IjoiMSUiLCJtYXJnaW4tbGVmdCI6IjElIn19fQ==&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner css=&#8221;.vc_custom_1727248731566{padding-left: 5% !important;}&#8221; woodmart_css_id=&#8221;66f3b9625488a&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmYzYjk2MjU0ODhhIiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text woodmart_color_scheme=&#8221;light&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h4>Risk assessment<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1727440605238{padding-right: 5% !important;padding-bottom: 2% !important;padding-left: 5% !important;background-color: #ffffff !important;border-radius: 15px !important;}&#8221; woodmart_css_id=&#8221;66f6a6d949426&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2YTZkOTQ5NDI2Iiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXJpZ2h0IjoiMSUiLCJtYXJnaW4tbGVmdCI6IjElIn19fQ==&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/2&#8243; woodmart_css_id=&#8221;66f67aa6d65f7&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2N2FhNmQ2NWY3Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<strong>To properly secure your infrastructure, first conduct a risk assessment of your assets. Risk assessment helps determine the relative importance of resources in the network, the vulnerability of those resources to specific operational hazards, and the likelihood of incidents related to the security of those resources.<\/strong><\/p>\n<p>Strong security policies focus on how to best protect your most important and at-risk assets. For example, if a network resource is critical and the likelihood of an attack on it is high, focus your efforts on creating security policies to monitor such attacks and develop plans to respond to them.<\/p>\n<p>Once these analyzes are performed, security policies can be designed in response to the relative asset value and exploitation risk posed by various threats and vulnerabilities. A special environment is industry (OT) and control systems, including I&amp;C (ICS &#8211; Industrial Control System). Reference model \u2013 IACS (Purdue Model) shows layered dependencies and properly arranged architecture of the industrial environment.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243; woodmart_css_id=&#8221;66f67aa1b01d9&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2N2FhMWIwMWQ5Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]Unfortunately, most industrial environments, already at the level of architecture and technological compatibility of individual products, significantly influence the automatic materialization of reams, which we observe in everyday work and qualify them as faults and failures.<\/p>\n<p>Most threats in OT come from the suppliers themselves and the companies operating the delivered industrial systems. The SIEM system (regardless of the manufacturer) helps in identifying threats, but the input data must be properly prepared and, at the architecture level, the resistance of individual components and their systems to anomalies must be increased.<\/p>\n<p>Correct network architecture significantly reduces environmental vulnerabilities and limits threats. For this reason, DNC series network devices (switches, routers, ZBFW, IDS\/IPS, Data Probes, Data LEDs, TAPs, etc.) are integrated with the SIEM system. The use of the entire ecosystem introduces the level of security to an unprecedented level of mantle protection, where there are no areas free from monitoring and reaction functions (defensive and offensive) are able to secure every segment and component in the network.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; css=&#8221;.vc_custom_1727431004176{background-color: #eff2f4 !important;}&#8221; woodmart_css_id=&#8221;66f68158254e6&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2ODE1ODI1NGU2Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column woodmart_css_id=&#8221;66ebe74dba867&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmViZTc0ZGJhODY3Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;][vc_row_inner gap=&#8221;35&#8243; css=&#8221;.vc_custom_1727430362109{padding-top: 5% !important;}&#8221; woodmart_css_id=&#8221;66f67ed47d0a8&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2N2VkNDdkMGE4Iiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h3>How ARIC SIEM helps you assess and mitigate risk<\/h3>\n<p>[\/vc_column_text][vc_column_text woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]SIEM ARIC and DNC appliances enable you to identify key assets and set policies to alert you when these assets have vulnerabilities or are under attack. SIEM ARIC will generate alerts based on the risk associated with any security event recorded on the DNC device.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h5><strong>The significance of a given security incident depends on three factors:<\/strong><\/h5>\n<p>[\/vc_column_text]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-66f6a89c7fb80\" class=\" wd-rs-66f6a89c7fb80 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1727441057407\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-small box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t01\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p><strong>The value of the resource associated with the event<\/strong><\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style><\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-66f6a8a344721\" class=\" wd-rs-66f6a8a344721 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1727441063248\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-small box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t02\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p><strong>The threat represented by the event<\/strong><\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style><\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-66f6a8a8ba669\" class=\" wd-rs-66f6a8a8ba669 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1727441068285\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-text text-size-small box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t03\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p><strong>The probability of an event occurring<\/strong><\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style><\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_css_id=&#8221;6707da629e9b5&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzA3ZGE2MjllOWI1Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;yes&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; woodmart_color_gradient=&#8221;rgb(239, 242, 244)-0\/rgb(255, 255, 255)-11\/|linear-gradient(top , rgb(239, 242, 244) , rgb(255, 255, 255) 11%)|linear|top&#8221; css=&#8221;.vc_custom_1728567911040{margin-bottom: -40px !important;}&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1727441050348{background-color: #0f705a !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 15px !important;}&#8221; woodmart_css_id=&#8221;66f6a8945cda2&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2YTg5NDVjZGEyIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXJpZ2h0IjoiMSUiLCJtYXJnaW4tbGVmdCI6IjElIn19fQ==&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner css=&#8221;.vc_custom_1727248731566{padding-left: 5% !important;}&#8221; woodmart_css_id=&#8221;66f3b9625488a&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmYzYjk2MjU0ODhhIiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text woodmart_color_scheme=&#8221;light&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h4 style=\"text-align: left;\">How SIEM helps detect threats and prioritize responses<\/h4>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]The following illustration shows the capabilities and related tools that SIEM ARIC provides to help you perform security management tasks in your own environment.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1727430919624{padding-bottom: 2% !important;}&#8221; woodmart_css_id=&#8221;66f681018600d&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmY2ODEwMTg2MDBkIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/2&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707c01925651\" class=\" wd-rs-6707c01925651 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728561182229\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Asset Discovery<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>&#8211; combines core discovery and inventory technologies to provide visibility into the devices on your network. Extras included:<\/p>\n<ul>\n<li aria-level=\"1\">Active and passive network scanning<\/li>\n<li aria-level=\"1\">Asset inventory<\/li>\n<li aria-level=\"1\">Service inventory<\/li>\n<\/ul>\n<p>Asset discovery and inventory are the first important steps to finding out what systems and devices are on your network. SIEM ARIC combines core discovery and inventory technologies to provide visibility into the devices you want to monitor.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-673c8f5547c2f\" class=\" wd-rs-673c8f5547c2f wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1732022102133\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Intrusion detection<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>\u2014 koordynuje reakcj\u0119 na incydenty i zarz\u0105dzanie zagro\u017ceniami w ca\u0142ej sieci dzi\u0119ki wbudowanym technologiom monitorowania bezpiecze\u0144stwa, informacjom o pojawiaj\u0105cych si\u0119 zagro\u017ceniach otrzymywanych z AT&amp;T oraz p\u0142ynnemu przep\u0142ywowi pracy w zamkni\u0119tej p\u0119tli umo\u017cliwiaj\u0105cemu szybkie usuwanie skutk\u00f3w.<\/p>\n<p><strong><br \/>\nAdd-ons in the SIEM system:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">Network IDS (NIDS)<\/li>\n<li aria-level=\"1\">Host-based IDS (HIDS)<\/li>\n<li aria-level=\"1\">File Integrity Monitoring (FIM)<\/li>\n<\/ul>\n<p>Built-in file integrity monitoring in agents installed on servers and other end devices warns about unauthorized modifications to system files, configuration files or content. Monitoring network access using host agent-based detection systems and network data allows you to identify who has attempted to access these systems, files, and content.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-6707bfecde9cc\" class=\" wd-rs-6707bfecde9cc wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1728561139487\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Security Information and Event Management (SIEM)<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>&#8211; Identify, contain and eliminate threats across your network by prioritizing risk and response. <strong>Add-ons in SIEM:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">Log management<\/li>\n<li aria-level=\"1\">Integrated OTX threat intelligence<\/li>\n<li aria-level=\"1\">SIEM event correlation<\/li>\n<li aria-level=\"1\">Responding to incidents<\/li>\n<\/ul>\n<p>You can automatically correlate log data with actionable security analytics to identify policy violations and receive contextually appropriate and workflow-driven responses. You can also perform forensic analysis of events using digitally signed raw logs. Raw logs can also be used to meet evidence storage requirements. The web-based user interface provides access to all security management features provided by SIEM ARIC. The SIEM ARIC User Guide provides information on how to access and use all SIEM tools and perform specific security management operations from this user interface.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-673c8f7a8f6a1\" class=\" wd-rs-673c8f7a8f6a1 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1732022142803\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Laboratories<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>DYNACON Labs is the internal security research team at DYNACON and Alien Labs is the analogous research team at Cybersecurity, consisting of security experts who conduct ongoing research and analysis of emerging global threats and vulnerabilities. This team continuously monitors, analyzes, reverse-engineers and reports on sophisticated zero-day threats, including malware, botnets and phishing campaigns.<\/p>\n<p>The team regularly publishes threat intelligence updates to the ARIC SIEM platform in the form of correlation directives, IDS signatures, vulnerability signatures, asset detection signatures, IP reputation data, data source plug-ins and report templates. The team also provides up-to-date guidance on emerging threats and contextual remediation guidance to speed and simplify threat detection and response.<\/p>\n<p>The DYNACON team also leverages the collective resources of OTX, the world&#8217;s largest crowdsourced threat intelligence repository, to provide global visibility into attack trends and malicious actors. Security experts and DYNACON analyze, verify and review global threat intelligence collected by the OTX community. The Security Research team improves the effectiveness of any security monitoring program by providing the threat intelligence necessary to understand and resolve the most critical issues on networks. They perform analysis so you can spend your limited time fixing and mitigating threats rather than investigating them.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-672dc257daf7f\" class=\" wd-rs-672dc257daf7f wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1731052122249\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Vulnerability assessment<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>&#8211; identifies resources and devices with unpatched software, insecure configurations and other network vulnerabilities.<br \/>\nExtras included:<\/p>\n<ul>\n<li>Continuous vulnerability monitoring<\/li>\n<li>Authenticated\/Unauthenticated Active Scanning<\/li>\n<li>Repair verification<\/li>\n<\/ul>\n<p>Integrated internal vulnerability scanning informs you about vulnerabilities in your network so you can prioritize patching and remediation. Continuous correlation of the dynamic asset inventory with our vulnerability database ensures up-to-date information on your network&#8217;s vulnerabilities between scheduled scans.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-673c8f4e3c482\" class=\" wd-rs-673c8f4e3c482 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1732022094896\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Behavioral monitoring<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>&#8211; Identifies anomalies and other patterns that signal new, unknown threats on your network, as well as suspicious behavior and policy violations by authorized users and devices.<\/p>\n<p><strong><br \/>\nAdd-ons in the SIEM system:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">NetFlow analysis<\/li>\n<li aria-level=\"1\">Monitoring the availability of services<\/li>\n<li aria-level=\"1\">Network protocol analysis\/packet capture<\/li>\n<\/ul>\n<p>Integrated behavioral monitoring collects data that helps understand &#8220;normal&#8221; system and network activity, simplifying incident response when investigating a suspected operational issue or potential security incident. Full packet capture enables complete analysis of network traffic protocols, providing a comprehensive reconstruction of the event that occurred during a potential breach.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-673c8f6588bca\" class=\" wd-rs-673c8f6588bca wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1732022121510\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">Regulatory compliance management in SIEM ARIC<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>In addition to regular security management operations, SIEM ARIC also provides essential security features to help you achieve regulatory compliance. With built-in asset discovery, vulnerability assessment, intrusion detection, behavior monitoring, log management and file integrity monitoring, SIEM ARIC can help organizations achieve compliance with regulations such as PCI DSS, GLBA, ISO\/IEC 27001, FISMA, NERC CIP, FERPA and SOX. SIEM ARIC also generates built-in reports specifically for HIPAA, PCI, GLBA, ISO 27001, FISMA, NERC CIP, GPG13 and SOX.<br \/>\nAdditionally, the &#8220;Using SIEM ARIC for PCI Compliance&#8221; section provides detailed information on using SIEM ARIC to achieve PCI DSS compliance. This information may also be useful for compliance with other standards.<\/p>\n<p><strong> Information about threat intelligence<\/strong><\/p>\n<p>Threat Intelligence, integrated with ARIC&#8217;s SIEM as part of a Threat Intelligence subscription, provides features that set it apart from most other security management solutions on the market today. Threat Intelligence, developed by the AT&amp;T Security Research Team and powered by AT&amp;T Open Threat Exchange\u00ae ( OTX\u2122 ), is actionable intelligence about the threats facing your network, including malicious actors, their tools, their infrastructure and its methods. Threat intelligence tells you what the threat is, where it comes from, which assets in your environment are at risk, and how to respond.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-673c8f977ca04\" class=\" wd-rs-673c8f977ca04 wd-info-box wd-wpb text-left box-icon-align-left box-style- color-scheme- wd-bg-none wd-items-top vc_custom_1732022171114\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"info-svg-wrapper\" style=\"width: 20px;height: 20px;\"><img loading=\"lazy\" decoding=\"async\"  src=\"https:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/list-2.svg\" title=\"list-2\" width=\"20\" height=\"20\"><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title wd-font-weight-600 box-title-style-default wd-fontsize-m\">OTX<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Open Threat Exchange (OTX) is the world&#8217;s most trusted open threat intelligence exchange and analysis network. OTX provides open access to a global community of threat researchers and security professionals. It currently has over 100,000 participants worldwide, contributing over 19 million threat indicators every day. It delivers community-generated threat intelligence and OTX pulses, enables collaborative research, and automates the process of updating your security infrastructure with threat intelligence from any source. OTX enables every member of the security community to actively discuss, research, validate and share the latest threat data, trends and techniques, strengthening your security while helping others to do the same.<\/p>\n<p>The OTX community and associated threat intelligence is one of the key data sources used by the DYNACON team to generate threat intelligence. DYNACON leverages the collective resources of OTX by analyzing, verifying and curating global threat data provided by the OTX community.<\/p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1728482597456{padding-top: 3% !important;padding-bottom: 3% !important;}&#8221; woodmart_css_id=&#8221;67068d2295ec1&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzA2OGQyMjk1ZWMxIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column][vc_single_image image=&#8221;2485&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; onclick=&#8221;link_image&#8221; css=&#8221;&#8221; parallax_scroll=&#8221;no&#8221; woodmart_inline=&#8221;no&#8221;][\/vc_column][\/vc_row][vc_row content_placement=&#8221;top&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.3&#8243; woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;center-top&#8221; css=&#8221;.vc_custom_1727079248252{margin-bottom: -40px !important;background-image: url(http:\/\/www.dynacon.pl\/wp-content\/uploads\/2024\/09\/site-bg.jpg?id=682) !important;background-position: 0 0;background-repeat:-repeat !important;}&#8221; woodmart_css_id=&#8221;66f12353a8f74&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NmYxMjM1M2E4Zjc0Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column][vc_row_inner css=&#8221;.vc_custom_1729512582200{padding-top: 7% !important;padding-bottom: 15% !important;}&#8221; woodmart_css_id=&#8221;671644812660f&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NDQ4MTI2NjBmIiwic2hvcnRjb2RlIjoidmNfcm93X2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243; woodmart_color_scheme=&#8221;light&#8221; woodmart_text_align=&#8221;center&#8221; woodmart_css_id=&#8221;6716449777fc7&#8243; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NDQ5Nzc3ZmM3Iiwic2hvcnRjb2RlIjoidmNfY29sdW1uX2lubmVyIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXRvcCI6IjBweCJ9fX0=&#8221; wd_z_index=&#8221;no&#8221;][vc_column_text css=&#8221;&#8221; woodmart_inline=&#8221;no&#8221; text_larger=&#8221;no&#8221;]<\/p>\n<h2 style=\"text-align: center;\">ARIC Network Defence System<\/h2>\n<p>[\/vc_column_text]<div id=\"wd-671644bdcad62\" class=\" wd-rs-671644bdcad62   wd-rs-671644bdcad62 wd-button-wrapper text-center\"><a href=\"#my_popup\" title=\"\" class=\"btn btn-color-white btn-style-bordered btn-style-semi-round btn-size-default wd-open-popup \">ASK ABOUT OUR PRODUCT<\/a><\/div><div id=\"my_popup\" class=\"wd-popup wd-popup-element mfp-hide\" style=\"--wd-popup-width:800px;\">[vc_row][vc_column][vc_column_text woodmart_inline=\"no\" text_larger=\"no\"]\r\n<h3>Contact Us<\/h3>\r\n[\/vc_column_text]\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2210-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2210\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/pages\/2455#wpcf7-f2210-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2210\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2210-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<p><label> Name and surname<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label>Your e-mail address<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Topic<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-subject\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-subject\" \/><\/span> <\/label>\n<\/p>\n<p><label> Your message<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-message\"><textarea cols=\"40\" rows=\"10\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" name=\"your-message\"><\/textarea><\/span> <\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"SEND\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n[\/vc_column][\/vc_row]<\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.3&#8243; woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;left-top&#8221; woodmart_css_id=&#8221;67164a0cbdcc9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NGEwY2JkY2M5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXRvcCI6Im9weCJ9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; css=&#8221;.vc_custom_1729514036844{margin-top: -80px !important;background-image:<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2455","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ARIC Network Defence System - Dynacon<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ARIC Network Defence System - Dynacon\" \/>\n<meta property=\"og:description\" content=\"[vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.3&#8243; woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;left-top&#8221; woodmart_css_id=&#8221;67164a0cbdcc9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NGEwY2JkY2M5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXRvcCI6Im9weCJ9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; css=&#8221;.vc_custom_1729514036844{margin-top: -80px !important;background-image:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Dynacon\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Dynacon-Sp-z-oo\/100064195892845\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T13:37:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"42 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/\",\"url\":\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/\",\"name\":\"ARIC Network Defence System - Dynacon\",\"isPartOf\":{\"@id\":\"https:\/\/www.dynacon.pl\/en\/#website\"},\"datePublished\":\"2024-11-21T08:44:55+00:00\",\"dateModified\":\"2024-12-09T13:37:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.dynacon.pl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ARIC Network Defence System\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dynacon.pl\/en\/#website\",\"url\":\"https:\/\/www.dynacon.pl\/en\/\",\"name\":\"Dynacon\",\"description\":\"Reliability can be bought \u2014 it&#039;s a product feature.     Cybersecurity can&#039;t \u2014 it&#039;s a process, powered by ARTEMIDA.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dynacon.pl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ARIC Network Defence System - Dynacon","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/","og_locale":"en_US","og_type":"article","og_title":"ARIC Network Defence System - Dynacon","og_description":"[vc_row content_placement=&#8221;middle&#8221; parallax=&#8221;content-moving&#8221; parallax_speed_bg=&#8221;1.3&#8243; woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;left-top&#8221; woodmart_css_id=&#8221;67164a0cbdcc9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2NzE2NGEwY2JkY2M5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnsibWFyZ2luLXRvcCI6Im9weCJ9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; css=&#8221;.vc_custom_1729514036844{margin-top: -80px !important;background-image:","og_url":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/","og_site_name":"Dynacon","article_publisher":"https:\/\/www.facebook.com\/people\/Dynacon-Sp-z-oo\/100064195892845\/","article_modified_time":"2024-12-09T13:37:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"42 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/","url":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/","name":"ARIC Network Defence System - Dynacon","isPartOf":{"@id":"https:\/\/www.dynacon.pl\/en\/#website"},"datePublished":"2024-11-21T08:44:55+00:00","dateModified":"2024-12-09T13:37:02+00:00","breadcrumb":{"@id":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dynacon.pl\/en\/aric-network-defense-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.dynacon.pl\/en\/"},{"@type":"ListItem","position":2,"name":"ARIC Network Defence System"}]},{"@type":"WebSite","@id":"https:\/\/www.dynacon.pl\/en\/#website","url":"https:\/\/www.dynacon.pl\/en\/","name":"Dynacon","description":"Reliability can be bought \u2014 it&#039;s a product feature.     Cybersecurity can&#039;t \u2014 it&#039;s a process, powered by ARTEMIDA.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dynacon.pl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/pages\/2455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/comments?post=2455"}],"version-history":[{"count":10,"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/pages\/2455\/revisions"}],"predecessor-version":[{"id":2822,"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/pages\/2455\/revisions\/2822"}],"wp:attachment":[{"href":"https:\/\/www.dynacon.pl\/en\/wp-json\/wp\/v2\/media?parent=2455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}