This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

itsa 365: A kind of fireball of orange data structures
  • Whitepaper
  • Management, Awareness and Compliance

Development and operation of an efficient, automated Security Operations Center

Cyber security expert Dominik Oestreicher illustrates the setup and operation of an efficient, automated Security Operations Center.

In this white paper, you will learn what makes a SOC, how it works and what benefits its introduction has for you. It also explains which employees you need for a SOC and how a service provider can help you when, for example, your staffing levels are low. You will also learn about the typical distribution of roles in a SOC operation and how you can introduce it in your company. Last but not least, the whitepaper also addresses the question of how to proceed once a SOC has been established.


A document on this subject is available in German. Would you like to read it? Switch to the German view.


This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.