SOC Establishment

SOC ESTABLISHMENT CYBER SECURITY SOLUTION

 

The CyberSOC is designed to cope with cyber-attacks and protect organizations from severe damages. The Security Operation Center (SOC) is the heart of the information security eco-system providing clear visibility into security vulnerabilities and threats penetrating the organization.

SOC ESTABLISHMENT

END-TO-END SOLUTION

CONSULTANCY

 

Comprehensive guidance for establishing correct policies and requirements in accordance with the client’s environment and strategic goals.

PROCESS & PROCEDURES DEVELOPMENT

 

Tailored to your needs and requirements.

CYBERSOC TECHNOLOGY

 

Optimal process automation with easy customization and management platforms.

CAPACITY BUILDING

 

Education and Training of dedicated staff to the specific SOC operation.

ON-THE-JOB TRAINING

 

Cooperating the SOC with a combination of client personnel and Soteria experts until complete implementation is achieved.

IT & NETWORK DESIGN AND INSTALLATION

 

Complying with the highest standards.

SOC FACILITY

 

Architecture, construction and renovation, interior design and installation.

SUPPORT & MAINTENANCE

 

Maintaining a close and attentive relations with clients to ensure sustainable growth, improvement and satisfaction.

UPON COMPLETION

ESTABLISHMENT OF CENTRALIZED CYBER SECURITY OPERATIONS.

SOC

BUILDING BLOCKS 

SOC Technology

  • Powered by state-of-the-art Big Data SIEM Technology

OBJECTIVE:

SOC operators gain comprehensive insights and assistance in decision making for quick response and recovery times.

SOC Operations

  • Combination of processes, people and technologies

  • Monitor

  • Detect

  • Remediate

  • Report on security incidents

OBJECTIVE:

Protecting critical assets from severe impacts that could pose a threat to businesses, operations and citizenry.

CyberSOC Main Control Room - Capacity Building

  • Operated by highly trained and qualified cyber professionals:

  • Tier-1 Alert Analysts

  • Tier-2 Incident Management Analysts

  • Tier-3 Threat Hunting and Forensics Experts

  • CyberSOC Management

OBJECTIVE:

Trained and qualified SOC professionals providing effective threats detection and quick remediation and recovery from security incidents.

Crisis Room

  • Full view of the main control room and video wall

  • Private and secluded

  • Suitable for crisis management

  • Communication platform linked to key entities

OBJECTIVE:

Designed to handle crisis situations of grave importance which require special measures other than the regular SOC routine.

Logistic & Maintenance Rooms

  • Meeting Rooms, Servers Room

  • System Engineering,

  • Commander and Security Monitoring,

  • Logistic & Administration,

  • External Coordination

  • Reception and common areas

OBJECTIVE:

Optimal operation, safe infrastructure and convenient environment.

TRAINING CYBER PROFESSIONALS

Security Analysts

Tier 1 – Events Monitoring and Alert

Tier 2 – Incidents managers

CERT and threat hunting investigators

Tier 3 – Deep Investigations

Cyber Security Managers

CISOs

SOC Managers

IT Managers

Security Auditors

IT Security Engineers

Systems Configuration

IT Infrastructure design & Installation

Making unreachable destinations, reachable.

  • LinkedIn

2019© Protactics.com - All rights reserved.