Aleph Tav Technologies IDS and SIEM

Protect your enterprise users from watering hole attacks

Never trust a threat level meter that puts a watering hole attack and a drive-by attack under the same risk rating. No matter how much it seems to play out like its indiscriminate cousin (the drive-by attack), watering hole attacks are absolutely targeted. What’s worse, these are the kinds of attacks that use intelligence gathering […]

Perimeter Security at Aleph Tav Technologies

The age of comprehensive control: The rising need for a Security Operations Center

Network breach risks are expeditiously diversifying. Attackers are devising newer and complex methods to invade systems. The hacks on Ashley Madison and Sony serve as brutal reminders of the intensity and the ruthlessness of cyber terrorists who go all out to breach systems for data thereby holding individuals and corporate companies to ransom. Simply put, […]

Aleph tav Technologies - Protect against ransomware

Ransomware – Is it the new blackmail?

Imagine you have to leave your home on account of an emergency. There’s no one but your faithful nanny to take care of your house and your baby in your absence. You place your trust in your nanny and leave for the emergency only to return and find yourself locked out of your house with […]

security assessment for startups

How Secure is your Start-up? Analyse your security posture

A nascent technology organization can often have a pretty long ‘to-do list’. A mad rush ensues in the early stages of inception when business development efforts take up highest priority and security often ends up as one of the very last items on the list. If there’s anything to deduce from the pattern of cyber […]