Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7 / Booth Number 7-103

Security Operations Center


Managed security services Anti-spam solutions SIEM Security information and event management Security test suite Security management Vulnerability and patch management Risk analysis and management Log management IT service management Intrusion detection / prevention Endpoint security Email security Cyber-physical systems security Cloud (computing) security Bandwidth management Asset management / IT documentation Web application security Storage solutions Server-based computing Interface protection / Device management Network security Mobile device managment Hardware security Application security Counter-intelligence Systems management Content security Anti-virus and malware protection Unified threat management (UTM) / security appliances Forensics Consulting IT security Certification of products and services Remote access (VPN) Network access control (NAC) License management Digital / Enterprise Rights Management (DRM/ERM) Biometrics User (rights) management Admission control Access protection Identity and access management Computer emergency response team (CERT) Authentication Data protection, data security Data recovery Data leakage / loss prevention Firewalls Denial of service protection Backup solutions Compliance / GRC (products and services) Business continuity Threat analysis Single sign-on

Key Facts

  • SOC
  • Security Operations Center
  • SOC 24/7

Product Description

How does modern IT security management work? In view of increasingly complex threats, what basic conditions do companies need to create for this?


The wealth of systems available to protect a company from cyber attacks is enormous. The threats to which IT is exposed are just as diverse. Today, a new firewall rule no longer provides adequate protection. In a Security Operations Center (SOC), specialized IT security s monitor all existing security tools - around the clock, seven days a week. A SIEM as the heart of IT security and a comprehensive risk and vulnerability management are crucial for successful operation.


Experts from AirITSystems will be happy to explain to you which technical components make up an efficient SOC and why, ideally, operations should not be organizationally located with the firewall administrators. They will show you which building blocks of a SOC companies can cover well in their own operations and when it makes sense to purchase services "as a service". And that also 24/7.


Shock or SOC? Download whitepaper:

... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.