Comprehensive security monitoring
On-premises, virtual, or in the cloud.
With our MDR/SOC as a Service, we not only monitor your physical systems but also your virtualized environments. Connections to platforms like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure are also seamlessly possible. Through deep integration of our solution within your system environment, we ensure the best possible monitoring and response to critical events.
Comprehensive security monitoring
Whether on-premises, virtual, or in the cloud.
With our MDR/SOC as a Service, we monitor not only your physical systems but also virtualized and cloud environments, including Amazon Web Services (AWS) and Microsoft Azure. Through deep integration of our solution into your system environment, we ensure the best possible monitoring and response to critical events.
Protect
Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.
Detect
SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.
Respond
The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.
Protect
Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.
Detect
SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.
Respond
The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.
Protect
Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.
Detect
SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.
Respond
The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.
The combination of
EDR ► XDR ► AI ► Analyst
The effective combination of automatic detection of attacks and active monitoring by experts ensures rapid detection of potential cyberattacks and the timely initiation of appropriate measures.
Our ActiveResponse enables us to initiate targeted countermeasures at endpoint and overall infrastructure level.
A prior, comprehensive risk analysis and our dual control principle ensure the highest possible level of protection against false positives.
The combination of
EDR ► XDR ► AI ► Analyst
The effective combination of automatic detection of attacks and active monitoring by experts ensures rapid detection of potential cyberattacks and the timely initiation of appropriate measures.
Our ActiveResponse enables us to initiate targeted countermeasures at endpoint and overall infrastructure level.
A prior, comprehensive risk analysis and our dual control principle ensure the highest possible level of protection against false positives.
SOCaaS 24/7 Availability
A modern IT infrastructure comprises various security aspects, of which firewalls and virus protection are only sub-components. More is needed to ensure IT security and the associated fail-safety in the company: it is important to recognize vulnerabilities and attacks on the company’s own IT network, to react in good time and to be prepared for emergencies. A sustainable and holistic IT security strategy therefore consists of three aspects, in which a Security Operations Center, or SOC for short, forms the complementary component when it comes to protection against cyber attacks.
SOCaaS 24/7 Availability
A modern IT infrastructure comprises various security aspects, of which firewalls and virus protection are only sub-components. More is needed to ensure IT security and the associated fail-safety in the company: it is important to recognize vulnerabilities and attacks on the company’s own IT network, to react in good time and to be prepared for emergencies. A sustainable and holistic IT security strategy therefore consists of three aspects, in which a Security Operations Center, or SOC for short, forms the complementary component when it comes to protection against cyber attacks.
Adaptable and Versatile- SOC as a Service
IT infrastructures
Infrastructure monitoring provides benchmarks for the optimal operation of physical systems. It detects attacks more quickly and enables IT teams to proactively identify and close potential security gaps.
Small
1 - 49 EDS*Medium
50 - 99 EDS*Large
100 - 499 EDS*X-Large
500 - 999 EDS*Individual
> 1000 EDS*- Event data from client and server as well as infrastructure and network monitoring
- Process monitoring
“Use case” based analysis - Onboarding process project-related, according to effort
*EDS (event data source) e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
IT-Infrastructures
Infrastructure monitoring provides benchmarks for the optimal operation of physical systems. It detects attacks more quickly and enables IT teams to proactively identify and close potential security gaps.
Small
1 - 49 EDS*Medium
50 - 99 EDS*Large
100 - 499 EDS*X-Large
500 - 999 EDS*Individual
> 1000 EDS*- Event data from client and server as well as infrastructure and network monitoring
- Process monitoring
“Use case” based analysis - Onboarding process project-related, according to effort
*EDS (event data source) e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
Active vulnerability management
Detect and eliminate cyber risks in distributed IT environments in advance. On our active vulnerability scanner dashboards, you can always see where there are potential threats. On request, we can advise you on how to close these gaps effectively.
Small
1 - 49 Systems***Medium
50 - 99 Systems***Large
100 - 499 Systems***X-Large
500 - 999 Systems***Individual
> 1000 Systems***The “Active Vulnerability Management” module of the CSOC carries out an investigation for known vulnerabilities on the defined systems. The findings help the administrators to identify and rectify patch errors and misconfigurations that can be used directly to attack the IT systems. The scans are carried out according to a customized schedule. In addition to the network scan of a system’s open ports, a host scan of the system can also be carried out. This enables the identification of vulnerabilities in installed software.
The results are seamlessly integrated into our customer dashboard. The information can then be extracted from the dashboard and used to eliminate the vulnerabilities.
*e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
***Active vulnerability management is only available in conjunction with the commissioning of the SOC /SIEMaaS.
Active vulnerability
management
Detect and eliminate cyber risks in distributed IT environments in advance. On our active vulnerability scanner dashboards, you can always see where there are potential threats. On request, we can advise you on how to close these gaps effectively.
Small
1 - 49 Systems***Medium
50 - 99 Systems***Large
100 - 499 Systems***X-Large
500 - 999 Systems***Individual
> 1000 Systems***The “Active Vulnerability Management” module of the CSOC carries out an investigation for known vulnerabilities on the defined systems. The findings help the administrators to identify and rectify patch errors and misconfigurations that can be used directly to attack the IT systems. The scans are carried out according to a customized schedule. In addition to the network scan of a system’s open ports, a host scan of the system can also be carried out. This enables the identification of vulnerabilities in installed software.
The results are seamlessly integrated into our customer dashboard. The information can then be extracted from the dashboard and used to eliminate the vulnerabilities.
*e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
***Active vulnerability management is only available in conjunction with the commissioning of the SOC /SIEMaaS.
OT-INFRASTRUCTURES
Thanks in part to proprietary protocols, operational technology (OT) has long been isolated from the IT network and relatively safe from cyberattacks. As a result of increasing networking with Industry 4.0 and the Internet of Things, these two worlds are growing ever closer together and OT systems are also becoming a target for hackers.
Small
1 - 49 EDS*Medium
50 - 99 EDS*Large
100 - 499 EDS*X-Large
500 - 999 EDS*Individual
> 1000 EDS*Event data from PLC and server as well as infrastructure and network monitoring
- Monitoring of specific OT protocols
- „Use Case“ based analysis
- Onboarding process project-related, at cost
*EDS (event data source) e.g.: Production systems, medical technology, control center technology, IoT, etc.
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing. In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
OT-INFRASTRUCTURES
Thanks in part to proprietary protocols, operational technology (OT) has long been isolated from the IT network and relatively safe from cyberattacks. As a result of increasing networking with Industry 4.0 and the Internet of Things, these two worlds are growing ever closer together and OT systems are also becoming a target for hackers.
Small
1 - 49 EDS*Medium
50 - 99 EDS*Large
100 - 499 EDS*X-Large
500 - 999 EDQ*Individual
> 1000 EDS*Event data from PLC and server as well as infrastructure and network monitoring
- Monitoring of specific OT protocols
- „Use Case“ based analysis
- Onboarding process project-related, at cost
*EDS (event data source) e.g.: Production systems, medical technology, control center technology, IoT, etc.
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing. In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
FURTHER INFORMATION
With the provision of an email address, we would be pleased to send you further information regarding our SOCaaS.
* Fields marked with an asterisk are mandatory.