Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Consulting

Hall 9 / Booth Number 9-100

Design, contracting, implementation and operational support of a SOC

Key Facts

  • Beratung Security Operations Center (SOC)
  • Beratung Security Information and Event Management (SIEM)
  • Beratung Log Management

Product Description

Due to an ever more far-reaching and comprehensive digitalisation and networking of the IT and OT infrastructure, new attack possibilities are constantly emerging, e.g. phishing, ransomware or advanced persistent threats. The associated risk situation as well as legal and regulatory frameworks (e.g. IT security law) require an increasing focus on the detection, reporting and handling of security incidents related to the company's IT and OT infrastructure. This task is typically performed by a Security Operations Centre (SOC). As a manufacturer-independent service provider, we support you from the requirements analysis, design and procurement to the implementation and operating phase of a SOC and offer you the following services in particular: - Survey of your requirements for a SOC, e.g. relevant specifications and guidelines, definition of the information network, identification of the necessary Scope of functions (log management, incident detection, incident response, threat intelligence, ...) - Design of the SOC, e.g. technical (log management, SIEM, use case management, incident management, reporting, integration with a CERT, ...), organisational (organisational structure, roles, processes, ...) - Design of log management, e.g. required log sources, use of collectors, required log information, secure transmission of log information, time synchronisation - Evaluation (organisational, technical, economic) of suitable operator models for the SOC, e.g. in-house operation, outsourcing, hybrid models - Advice on the award of SOC services: Preparation of tender documents, support during the awarding of contracts, support during implementation - Support for the operation of a SOC (SOC Analysts) As one of only a few BSI-certified IT security service providers, we are a reliable partner for secure ITC infrastructures.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.