Skip to Main Content

Network Security

AURA and RGA take the utmost care to ensure policies and procedures are adhered to that protect against unauthorized access.

Comprehensive monitoring and logging systems are in place and allow for a holistic view of the environment. 

In conjunction with state of the art Intrusion Detection/Intrusion Prevention (IDS/IPS), this allows for swift detection of, and reaction to, any potentially malicious behavior. Externally available services are secured by a Web Application Firewall (WAF) and are regularly subjected to penetration testing allowing vulnerabilities to be detected before they could be exploited.

These technologies all tie into detailed incident management and response policies and procedures that are regularly reviewed and improved.