Security Operations Center

Our Cyber Security Operations Center (SOC) offers Security-as-a-Service (SaaS) and has various security-related services that are contractually available with the subscription model. Individual services can be selected on the basis of support levels that cover the entire area of IT security.

Support Level 1: (Communication - Consulting)

  • Advice on IT security issues in operation
  • Consulting for operational decisions on the topic of IT security
  • Reporting & Interaction in case of safety-relevant incidents (Not an emergency!)

Support Level 2: (On-site Cooperation)

  • Support in the creation and management of IT security processes
  • Consultations on IT security issues
  • Consulting for the development of secure IT infrastructures

Support Level 3: (Emergency Service)

  • 24/7 availability & retrievability for digital security incidents
  • Active support in the event of digital security-related incidents on site
  • Consultation, insight or analysis of the specific incident on site
  • Support and cooperation in implementation and preparation of measures on site

Support Level 4: (Vulnerability Monitoring)

  • 24/7 monitoring of known and zero-day vulnerabilities (public & private)
  • 24/7 monitoring for leaks of sensitive operational information & relevant data
  • Message & follow-up communication to defined interfaces (ticket system, API ...)
  • Evaluation and analysis of security gaps, weaknesses or vulnerabilities
  • Integration of product lists for security relevant updates & releases (risk factor)

Support Level 5: (Live Analysis, Insight, Active Monitoring, Prevention, Measures & Interaction)

  • Log file monitoring (web server, system & services) - Web security
  • Alarm monitoring (web server, system & services) - Web security
  • Monitoring and Updates of AV Signatures - Email Security
  • Monitoring & testing of cryptographic mechanisms - Encryption & Cipher
  • Data Loss Prevention & Management
  • Access to resources through framework in increasingly heterogeneous technology environments to meet increasingly stringent compliance requirements (IAM)
  • Firewall, IDS & IPS evaluation & support - Intrusion Management Services
  • Analysis, consulting, insight & preventive measures - Network security
  • Requirements study and situation analysis, creation and updating of security policies, document review, risk analysis, vulnerability scan, data analysis & report  briefing (Assessment)
  • Software products and services combine security information management and security event management. (SIEM)
  • Vulnerability Scanning (Commercial and recommended products - Automated)
  • Web-Firewall, Filter Appliance, Security Gateway, VPN, Proxy) & automated check as well as data analysis according to defined time interval - Web Security

Would you like to use individual service level processes that are tailored to your company? Are you interested in integrating the security process of the SOC (Security Operations Center) as a whole mechanism or just the Security as a Service service externally? You are welcome to contact us at any time to check the requirements

Languages

Social Networks

Twitter icon
Facebook icon

Syndicate

Subscribe to Syndicate