Utilising state-of-the-art intrusion detection tools, we monitor all environments with cloud (CIDS), network (NIDS) and host intrusion detection systems (HIDS), to identify unauthorised or anomalous activity and behaviour – preventing any network intrusions or threats to security.