Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Hall 7 / Booth Number 7-202

Security Operations Center

Categories

Certification of products and services Compliance/GRC (products and services) Business continuity Threat analysis Backup solutions Data center security Data center operation E-Commerce Critical Infrastractures Small and medium-sized enterprises Industrial IT security Healthcare Financial Sector Energy and water supply Computer emergency response team (CERT) Web application security Server-based computing Interface protection/Device management Network security Mobile Device Managment Hardware security Endpoint security Email security Cyber-physical systems security Content security Cloud (computing) security Bandwidth management Asset management/IT documentation Application security Storage solutions Firewalls Denial of service protection Authentication Consulting IT security Admission control Access protection Single sign-on Remote access (VPN) Network access control (NAC) License management Identity and access management Digital/Enterprise Rights Management (DRM/ERM) Biometrics User (rights) management Intrusion detection/prevention Data protection, data security Data recovery Data leakage/loss prevention Anti-virus and malware protection Unified threat management (UTM)/ security appliances Systems management Counter-intelligence Anti-spam solutions SIEM Security Information and Event Management Security Test Suite Security management Vulnerability and patch management Risk analysis and management Log management IT service management Forensics Managed security services

Key Facts

  • SOC
  • Security Operations Center
  • SOC 24/7

Product Description

How does modern IT security management work? In view of increasingly complex threats, what basic conditions do companies need to create for this?

 

The wealth of systems available to protect a company from cyber attacks is enormous. The threats to which IT is exposed are just as diverse. Today, a new firewall rule no longer provides adequate protection. In a Security Operations Center (SOC), specialized IT security s monitor all existing security tools - around the clock, seven days a week. A SIEM as the heart of IT security and a comprehensive risk and vulnerability management are crucial for successful operation.

 

Experts from AirITSystems will be happy to explain to you which technical components make up an efficient SOC and why, ideally, operations should not be organizationally located with the firewall administrators. They will show you which building blocks of a SOC companies can cover well in their own operations and when it makes sense to purchase services "as a service". And that also 24/7.

 

Shock or SOC? Download whitepaper: https://www.airitsystems.de/leistungen/it-sicherheit/security-operation-center-soc/soc-whitepaper

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.