Anomalous activity detection

The Hytec Managed Security Service includes an anomaly-based intrusion detection service

The Hytec team are linked to an intrusion dectection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on rules, rather than patterns or signature and attempts to detect any type of misuse that falls out of normal system operation.

In order to positively identify attack traffic, We teach the system to recognize normal system activity. The two phases of anomaly detection consists of the training phase (where a profile of normal behaviors is built by the Hytec team) and testing phase (where current traffic is compared with the profile created in the training phase). Our intelligent technology identifies and report anomalous network and/or machine activity, for example unusually high network traffic and service availability issues.

The Hytec Managed Security  service provides both Network Intrusion Detection Systems (NIDS) and Host Intrusion Detection Systems (HIDS).  This will detect attempted and/or successful intrusion activity. Agents are deployed at strategic locations within your infrastructure. The agents work in harmony with other elements of the managed security service, and report to the unified management system.


Identification of suspicious activity

Extends to cloud services


 Network Intrusion Detection Systems (NIDS) and Host Intrusion Detection Systems (HIDS) used to identify activity 

Suspicious activity promptly investigated and reported