The ERCOT hired DYONYX to provide internal security services and project work.
DYONYX, along with its partnership with Alert Logic, provides IT security resources that review Intrusion Detection/Prevention Systems and system logs and provides CISSP level security expertise.
These resources will provide clients access to subject matter expertise in strategic planning and compliance/audit reviews. In addition, The Alert Logic solution provides the collection, correlation, alerting, and reporting capabilities that provides proactive information related to security threats.
Network traffic is spanned into the Alert Logic appliances for real-time threat monitoring and assessment. Additionally, log data is forwarded to the Log Manager appliance to correlate with the real-time traffic analysis to better determine the threat level of the suspicious activity.
In addition to proactive monitoring of the network traffic and logs, Threat Manager can be configured to scan the client network, internal and externally. These scans can be scheduled to execute whenever, and as often, as required.
Log Manger’s comprehensive custom and out-of-the-box correlation rules allow the identification of suspicious activity in log data, such as multiple unsuccessful login attempts. When suspicious activity is detected, Log Manager issues an automatic threat alert, sent directly to an email account, mobile phone or ticketing system. Custom workflow and incident notification reports can also be generated with Log Manager’s built-in case management system.