fase-1

Phase 01

Analysis

fase-2

Phase 02

Improvement and design

fase-3

Phase 03

Implement

fase-4

Phase 04

Disaster

fase-5

Phase 05

Monitor

fase-6

Phase 06

Insurance

8

PHASE 05

Monitoring


Identification

of critical assets

Asset identification information and critical systems. Establishment of safety requirements.

LINIA


Identification

of critical assets

Collect and analyze event logs from systems and applications. Detect any suspicious activity.

LINIA


Response

to incidents

Initiation of the incident response process if a security threat or incident is detected. Damage containment and mitigation.

LINIA


Configuration of

monitoring

monitoring

Configuration of firewalls, antivirus, intrusion detection systems, among others.


Detection

intrusion detection

Identification of anomalous patterns and behaviors in the network.

LINIA


Vulnerability

vulnerabilities

Periodic vulnerability analysis to identify and correct security weaknesses.

Effectiveness evaluation

Regular evaluation of the effectiveness of the monitoring process. Identification of areas for improvement. Adjustment of tools and processes as required.

Página web de Glofera