Security Information and Event Management

A solution which helps security teams detect, analyse, prioritise and respond to threats, security events and incidents across the infrastructure. The SIEM solution automatically analyses and aggregates logs and flows from thousands of devices, endpoints, and applications across your network and provides individual alerts to speed up assessment and response to security incidents.

IBM QRadar The Intelligent SIEM

We have been implementing SIEM solutions since 2010. We have performed dozens of successful projects in many different segments. Our team members have many years of experience in analysis, deployment, integration and development of SIEM solutions. We follow tried and tested procedures in such a way as to ensure maximum efficiency and minimisation of risks when deploying, integrating or operating SIEM solutions.

What SIEM offers me:

  • A comprehensive view of the security situation.
  • A real-time overview of what is happening in the infrastructure.
  • Overall streamlining of the security event and incident management process.
  • Provision of next level cybersecurity.

News

Vulnerability in Cisco Discovery Protocol

We would like to inform our customers about several critical vulnerabilities in Cisco Discovery Protocol, which an unauthorized attacker can misuse to perform either a Remote Code Execution nebo Denial of Service attack. There are five of these vulnerabilities rated from CVSS 7,4 to 8,8. You can see an identifier for each of the vulnerabilities including their CVSSv3 rating below.

Vulnerabilities in Microsoft Exchange Server have a serious impact. Simple patching is not enough.

Unauthorized access to e-mail. Potential dangers of malicious code installation, data theft and misuse thereof with social engineering methods. Local companies and institutions are in serious danger connected to the massive attacks on systems using Microsoft Exchange Server. The latest large-scale incident revealed the fact that simple updating is not sufficient for the protection of the company's system.

Zerologon: Critical Vulnerability of Windows AD

The name of the vulnerability is closely related to the main attack vector exploiting the vulnerability, which is a bug in the configuration of the initialisation vector (IV) when encrypting Netlogon Remote Protocol (MS-NRPC) messages, allowing an internal attacker to fully break the encryption and to pass off as any computer of his choice in the network.

Our vision

We believe that security will make sense even when the whole world moves to the cloud. There will always be new threats, new vulnerabilities, new challenges to face and respond to. Our goal is to become a security partner, a company you can turn to and trust at any time. We are Aricoma, we are a local company which has been operating on the market since 1991, and that is already quite an achievement.

Partners

IBM

I would be interested in having further information about

We will be happy to consult your specific situation.

Personal data are processed for the purpose of enabling Aricoma to offer its products and services in the form of telephone, email and other messages. Personal data comprises contact information and other personal data obtained directly from you. Your consent to the processing of your personal data is limited to a period of three years. The data controller is exclusively Aricoma Enterprise Cybersecurity a.s., VAT No. CZ04772148, Voctářova 2500/20a, CZ-180 00 Praha 8. You have the right to revoke your consent at any time by writing to Aricoma, Voctářova 20a, 18000 Praha or by emailing: gdpr [at] aricoma.com. If your consent is revoked, your data will no longer be processed for the aforementioned purpose and all data obtained for this purpose will be deleted, assuming that no other legal grounds exist for the processing of such data. If you suspect that your personal data is processed in violation of the applicable legislation, you have the right to file a complaint with the Office for Personal Data Protection, Pplk. Sochora 27, 170 00 Praha7; www.uoou.cz.