DoIT Header
  • Product Presentation
  • Management II
  • Managed Security Services / Hosting
  • SIEM / Threat Analytics / SOC

eSOC: A modular overall concept

How can a SOC be efficiently set up and operated in order to cover all of your IT security requirements? We'll show you.

10/7/2020 1:45:00 PM – 10/7/2020 2:00:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

DoIT Header
  • Product Presentation
  • Management II

How can a SOC be efficiently set up and operated in order to cover all of your IT security requirements? We'll show you.

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

The market for IT security solutions is confusing, which makes it difficult to find and implement comprehensive protection for your company. Choosing a suitable tool is cumbersome and time-consuming. On the other hand, there is an attack surface that is just as diverse as the threat landscape.

Customers who face this alone are often overwhelmed with the questions:

• Which cyber security product is the best?
• How does it fit into our existing system environment?
• Who helps me?

We answer exactly these questions with our specially developed efficient SOC concept (eSOC for short). The strength of our eSOC concept lies primarily in its clarity. The technical concept and the associated services are complete and leave no questions unanswered. The eSOC concept is based on many years of project experience and is continuously improved and renewed.

In our presentation, we will show you which modules can be used to efficiently set up and operate a security infrastructure. Our use case-based approach - which forms the basis of our eSOC security services - as well as a transparent cooperation play a decisive role in providing you with the necessary know-how to further develop your IT security.

read more

Speaker