Certified Security Operations Center GmbH

On-premises, virtual, cloud

Comprehensive security monitoring

On-premises, virtual, or in the cloud.

With our MDR/SOC as a Service, we not only monitor your physical systems but also your virtualized environments. Connections to platforms like Amazon Web Services (AWS), Google Cloud, and Microsoft Azure are also seamlessly possible. Through deep integration of our solution within your system environment, we ensure the best possible monitoring and response to critical events.

On-premises, virtual, cloud

Comprehensive security monitoring

Whether on-premises, virtual, or in the cloud.

With our MDR/SOC as a Service, we monitor not only your physical systems but also virtualized and cloud environments, including Amazon Web Services (AWS) and Microsoft Azure. Through deep integration of our solution into your system environment, we ensure the best possible monitoring and response to critical events.

Protect

Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.

Detect

SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.

Respond

The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.

Protect

Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.

Detect

SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.

Respond

The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.

Protect

Firewalls, virus protection and other components such as authentication methods, cloud security and IT security training for your employees form the protection component.

Detect

SOC as a Service monitors your system events, log files and the data traffic in your network for suspicious behavior and anomalies.

Respond

The SOCaaS control center analyzes and evaluates the incident so that measures and the elimination of vulnerabilities in affected IT systems and networks can take place.

SMART CONTROL CENTER

The combination of
EDR ► XDR ► AI ► Analyst

The effective combination of automatic detection of attacks and active monitoring by experts ensures rapid detection of potential cyberattacks and the timely initiation of appropriate measures.

Our ActiveResponse enables us to initiate targeted countermeasures at endpoint and overall infrastructure level.

A prior, comprehensive risk analysis and our dual control principle ensure the highest possible level of protection against false positives.

SMART control center

The combination of

EDR ► XDR ► AI ► Analyst

The effective combination of automatic detection of attacks and active monitoring by experts ensures rapid detection of potential cyberattacks and the timely initiation of appropriate measures.

Our ActiveResponse enables us to initiate targeted countermeasures at endpoint and overall infrastructure level.

A prior, comprehensive risk analysis and our dual control principle ensure the highest possible level of protection against false positives.

 

SOC 24x7

SOCaaS 24/7 Availability

A modern IT infrastructure comprises various security aspects, of which firewalls and virus protection are only sub-components. More is needed to ensure IT security and the associated fail-safety in the company: it is important to recognize vulnerabilities and attacks on the company’s own IT network, to react in good time and to be prepared for emergencies. A sustainable and holistic IT security strategy therefore consists of three aspects, in which a Security Operations Center, or SOC for short, forms the complementary component when it comes to protection against cyber attacks.

SOC 24x7

SOCaaS 24/7 Availability

A modern IT infrastructure comprises various security aspects, of which firewalls and virus protection are only sub-components. More is needed to ensure IT security and the associated fail-safety in the company: it is important to recognize vulnerabilities and attacks on the company’s own IT network, to react in good time and to be prepared for emergencies. A sustainable and holistic IT security strategy therefore consists of three aspects, in which a Security Operations Center, or SOC for short, forms the complementary component when it comes to protection against cyber attacks.

Adaptable and Versatile- SOC as a Service

SOC/SIEMaaS for

IT infrastructures

Infrastructure monitoring provides benchmarks for the optimal operation of physical systems. It detects attacks more quickly and enables IT teams to proactively identify and close potential security gaps.

Small

1 - 49 EDS*
910 per month**
  •  

Medium

50 - 99 EDS*
1.750 per month**
  •  

Large

100 - 499 EDS*
2.350 per month**
  •  

X-Large

500 - 999 EDS*
2.990 per month**
  •  

Individual

> 1000 EDS*
** per month**
  •  
  • Event data from client and server as well as infrastructure and network monitoring
  • Process monitoring
    “Use case” based analysis
  • Onboarding process project-related, according to effort

*EDS (event data source) e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.

SOC/SIEMaaS for

IT-Infrastructures

Infrastructure monitoring provides benchmarks for the optimal operation of physical systems. It detects attacks more quickly and enables IT teams to proactively identify and close potential security gaps.

Small

1 - 49 EDS*
910 per month**
  •  

Medium

50 - 99 EDS*
1.750 per month**
  •  

Large

100 - 499 EDS*
2.350 per month**
  •  

X-Large

500 - 999 EDS*
2.990 per month**
  •  

Individual

> 1000 EDS*
** per month**
  •  
  • Event data from client and server as well as infrastructure and network monitoring
  • Process monitoring
    “Use case” based analysis
  • Onboarding process project-related, according to effort

*EDS (event data source) e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.

PROTECTION THROUGH PREVENTION

Active vulnerability management

Detect and eliminate cyber risks in distributed IT environments in advance. On our active vulnerability scanner dashboards, you can always see where there are potential threats. On request, we can advise you on how to close these gaps effectively.

Small

1 - 49 Systems***
99 per month**
  •  

Medium

50 - 99 Systems***
175 per month**
  •  

Large

100 - 499 Systems***
290 per month**
  •  

X-Large

500 - 999 Systems***
520 per month**
  •  

Individual

> 1000 Systems***
** per month**
  •  

The “Active Vulnerability Management” module of the CSOC carries out an investigation for known vulnerabilities on the defined systems. The findings help the administrators to identify and rectify patch errors and misconfigurations that can be used directly to attack the IT systems. The scans are carried out according to a customized schedule. In addition to the network scan of a system’s open ports, a host scan of the system can also be carried out. This enables the identification of vulnerabilities in installed software.

The results are seamlessly integrated into our customer dashboard. The information can then be extracted from the dashboard and used to eliminate the vulnerabilities.

*e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
***Active vulnerability management is only available in conjunction with the commissioning of the SOC /SIEMaaS.

Protection trough prevention

Active vulnerability
management

Detect and eliminate cyber risks in distributed IT environments in advance. On our active vulnerability scanner dashboards, you can always see where there are potential threats. On request, we can advise you on how to close these gaps effectively.

Small

1 - 49 Systems***
99 per month**
  •  

Medium

50 - 99 Systems***
175 per month**
  •  

Large

100 - 499 Systems***
290 per month**
  •  

X-Large

500 - 999 Systems***
520 per month**
  •  

Individual

> 1000 Systems***
** per month**
  •  

The “Active Vulnerability Management” module of the CSOC carries out an investigation for known vulnerabilities on the defined systems. The findings help the administrators to identify and rectify patch errors and misconfigurations that can be used directly to attack the IT systems. The scans are carried out according to a customized schedule. In addition to the network scan of a system’s open ports, a host scan of the system can also be carried out. This enables the identification of vulnerabilities in installed software.

The results are seamlessly integrated into our customer dashboard. The information can then be extracted from the dashboard and used to eliminate the vulnerabilities.

*e.g: Operating systems, infrastructure systems and applications
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing.
In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.
***Active vulnerability management is only available in conjunction with the commissioning of the SOC /SIEMaaS.

SOC/SIEMAAS for

OT-INFRASTRUCTURES

Thanks in part to proprietary protocols, operational technology (OT) has long been isolated from the IT network and relatively safe from cyberattacks. As a result of increasing networking with Industry 4.0 and the Internet of Things, these two worlds are growing ever closer together and OT systems are also becoming a target for hackers.

Small

1 - 49 EDS*
910 per month**
  •  

Medium

50 - 99 EDS*
1.750 per month**
  •  

Large

100 - 499 EDS*
2.350 per month**
  •  

X-Large

500 - 999 EDS*
2.990 per month**
  •  

Individual

> 1000 EDS*
** per month**
  •  

Event data from PLC and server as well as infrastructure and network monitoring

  • Monitoring of specific OT protocols
  • „Use Case“ based analysis
  • Onboarding process project-related, at cost

*EDS (event data source) e.g.: Production systems, medical technology, control center technology, IoT, etc.
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing. In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.

SOC/SIEMAAS for

OT-INFRASTRUCTURES​

Thanks in part to proprietary protocols, operational technology (OT) has long been isolated from the IT network and relatively safe from cyberattacks. As a result of increasing networking with Industry 4.0 and the Internet of Things, these two worlds are growing ever closer together and OT systems are also becoming a target for hackers.

Small

1 - 49 EDS*
910 per month**
  •  

Medium

50 - 99 EDS*
1.750 per month**
  •  

Large

100 - 499 EDS*
2.350 per month**
  •  

X-Large

500 - 999 EDQ*
2.990 per month**
  •  

Individual

> 1000 EDS*
** per month**
  •  

Event data from PLC and server as well as infrastructure and network monitoring

  • Monitoring of specific OT protocols
  • „Use Case“ based analysis
  • Onboarding process project-related, at cost

*EDS (event data source) e.g.: Production systems, medical technology, control center technology, IoT, etc.
**The contract has a term of three months and can be terminated with one month’s notice to the end of the term. If the contract is not terminated, it will be extended by a further three months. Notice of termination must be given in writing. In certain cases (e.g. multiple locations / network segments), a different number of sensors and VPN connects may be required. In this case, we will be happy to provide you with an individual offer. Onboarding is calculated on a project-specific basis.

FURTHER INFORMATION

With the provision of an email address, we would be pleased to send you further information regarding our SOCaaS.

* Fields marked with an asterisk are mandatory.

error: