Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 6 / Booth Number 6-100

Security Operation Center/ Incident Response


Consulting IT security Big data Security Network security Web application security E-government Energy and water supply Financial Sector Healthcare Small and medium-sized enterprises Industrial IT security E-Commerce Data center operation Data center security Intrusion detection/prevention Risk analysis and management Security management Data recovery Critical Infrastractures

Key Facts

  • Detect attacks early before they become a danger
  • Making attacks harmless with appropriate means
  • Managed Service

Product Description

The Security Operation Center is an operational unit tasked with identifying cyber attacks in the network before they can develop their full risk potential. The typical cyber attack takes several months to spread far enough in the victim's network. During this time, the attacker tries to hide his attack as well as possible. In order to still recognize the attack, a SOC needs various elements: • Systems to capture the status data of end devices, central components, applications or IoT, production and medical devices. • Processes to ensure a complete and meaningful analysis and the appropriate response to security events. • Well-trained and experienced analysts. Despite all the intelligence of modern security systems, this human component is still the most important element of a well-functioning SOC. On the technological side, A1 Digital uses Splunk and Mandiant to collect and analyze status data. These components can be complemented by special systems for IoT, production and medical devices. The architecture enables comprehensive monitoring of all devices and applications connected to the network. Attackers find it more difficult to spread their attack unnoticed in the network and the potential victims gain time for a qualified incident response. As part of the incident response, the detected attack is rendered harmless using suitable means. The attack is prevented from spreading and systems that are already infected are cleaned. A1 Digital offers the SOC including the incident response as a managed service including all necessary applications and licenses. There is no need to invest in systems and there is no time-consuming search for personnel. Clear service levels and 7x24 operation ensure a secure network at all times.
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.