Cyber Security

ICterra cyber security professionals help you develop cyber security systems
according to your specific needs.

  • Integration of resources such as Suricata Intrusion Detection/Prevention System
  • Customization and integration of common server applications for host based attack detection and analysis
  • Development on top of open-source relational databases for real time log storage and retrieval
  • Machine to Machine (Command Control Center to Sensor) communication
  • Customizable Command Control Center providing ergonomic user experience through web application interface
  • Sensors deployable to dedicated or virtual machines on IPv4 and IPv6 networks
  • Software development cycle conformant to both CMMI Level-3 and Common Criteria requirements.

Scope and process of software development may be extended according to customers’ needs.