Services

SOC Tools

Providing NRENs with a baseline toolset for SOC services As the need for SOC...

Services

Services

SOC Tools

Providing NRENs with a baseline toolset for SOC services As the need for SOC operations arose within the NREN community, the GÉANT project created an interoperable set of tooling which can serve as a...

Read More

DDoS Mitigation Service

GÉANT DDoS Cleansing and Alerting Supporting GÉANT peering users with dynamic, fast responses to DDoS Distributed Denial of Service (DDoS) is a large and growing problem within the networking community with a large number of NRENs reporting attacks every month. These attacks not only damage live services for users but affect the reputation of the NREN amongst their users and consume large amounts of manpower and resources to respond to and counter them. As the growth of botnet and other DDoS...

Read More

NeMo DDoS software

Helping NRENs with DDoS and network anomaly detection The NeMo-DDoS software is a powerful tool for Netflow-based DDoS and traffic anomaly detection & analysis. It was originally developed to address NREN-specific network analysis needs and has been enhanced ever since. The software can be obtained and installed locally by GÉANT-associated NRENs to enhance backbone traffic visibility and enable DDoS workflows. NeMo’s key features are: Royality-free Open Source Software without any volume...

Read More

Trusted Certificate Services

Increasing online security by facilitating the deployment of digital certificates. On 1st May 2020, GÉANT will launch the 4th generation of its Trusted Certificate Service (TCS).  This service is offered in partnership with Sectigo, one of the largest global Certificate Authorities. TCS takes advantage of a bulk purchasing arrangement whereby participating national research and education networking organisations (NRENs) may issue close to unlimited numbers of certificates provided by a...

Read More

Vulnerability Management

Helping NRENs measure and verify the number of exposed vulnerable resources both externally and internally. A vulnerability assessment and management of vulnerabilities requires both the understanding of the environment but also the collective experiences on what specific vulnerabilities that are high risk in an academic environment. The National Research and Education Networks differ quite a lot from  similar-sized enterprise organisations in exposed resources however the CISO or those...

Read More
Skip to content