Académique Documents
Professionnel Documents
Culture Documents
Monitor Availability
Protect availability through real-time performance and status checks across all your
Web sites and applications, with content verification for HTTP/S and XML sites.
IKON MIS also helps monitor your network and links, along with underlying servers
supporting the web application to assess load and performance issues.
In addition, IKON includes a custom Load and Performance analyzer with the ability
to run specific use case test scenarios on your applications to monitor availability
and performance.
Protect integrity
Maintain confidentiality
with us to study our application architecture
and schema to ensure they had all aspects Maintain the confidentiality of your applications and data with web application
covered.
’’ — Frédéric Jésupret
Telecom & Security Manager
scans that detect all vulnerabilities at both server and application levels that are
open to exploits. IKON also provides real-time port scans and analysis to detect
unauthorized activity.
IKON SIEM is an optional add-on to your Web applications to provide log analysis
Mondial Assistance, France
and correlation across all your applications and devices in real-time.
Using proprietary IKON Data Collection Agents (DCA), IKON crawls your IKON Central Servers then provide real-time dashboards of performance and trend
Web applications to discover links and paths, which are then monitored analysis of the applications, giving you a unique visibility against your SLAs.
and assessed. IKON Web crawlers provide a complete structural
breakdown of your web applications.
Keross Network Operations Center
Web Application Scanning The Keross Network Operations Center (K-NOC) comprises a team of qualified
engineers working 24x7 to provide Managed Infrastructure Services to our customers.
IKON WAS provides inference-based scanning checks for specific Web The K-NOC can manage customer incidents and recurring tasks associated with web
Application Vulnerabilities, providing detailed reports for XSS, SQL applications, governed by customizable SLAs. K-NOC activity can be performed on-
Injection, Buffer overflow and File Include Vulnerabilities. demand, after business hours, or 24x7.
Real-time Dashboards