SECaaS

SECaaS/SOC

SECaaS/SOC

Our commitments

Our commitments
image engagement
image engagement
image engagement
image engagement
image engagement
image engagement
image engagement
image engagement

YOUR dedicated or shared SOC

YOUR dedicated or shared SOC
Mutualized SOC Systemis
(24/7 supervision by our experts)
picto
Our systemis solution - LEVEL 1
(based on BDU)
ATTACKS
majority of attacks
MALWARES
majority of malware
RANSOMWARE
majority of ransomware

Build the foundation gradually in order to achieve
to a mature SOC by 2025

Level 0
Year 0
Building the foundations
Level 0
  • Anti-Virus and IDS integration in a SIEM
  • Detection from signatures
  • Manual analysis and response
Image étape
Improving the maturity of the SOC
15%%
Level 1
Year 1
Strengthening the foundations
Level 1
  • Endpoint Detection & Response (EDR) integration
  • Adding behavioral detections
  • Automated enrichment of alerts
Image étape
Improving the maturity of the SOC
75%%
Level 2
Year 2
Stabilize the SOC* environment
Level 2
  • Integration of other sources to the SIEM** (DC, anti-spam, etc…)
  • Addition of anomaly detection scenarios
  • Automated qualification and remediation for some minor scenarios
Image étape
Improving the maturity of the SOC
85%%
Level 3
Year 3
Continuous improvement
Level 3
  • Client application integration
  • Adding business detection scenarios
  • Automated qualification and remediation for most minor scenarios
Image étape
Improving the maturity of the SOC
95%%

Benefits

Benefits
image avantage
picto avantage
Excellent report
security/investment ratio
picto avantage
A team of experts
at your disposal
picto avantage
Rapid deployment
picto avantage
Support in
your rise to maturity
picto avantage
Drastic increase in detection and
response capabilities upon deployment

What is a SOC?

An SOC is a facility that houses a security unit responsible for continuously monitoring and analyzing an organization’s security posture. The objective of the SOC is to detect, analyze and intervene in case of cybersecurity incidents. It does this by using a combination of technology devices and a set of processes to detect and escalate incidents so that teams can respond quickly. With the increase in the number of cyber attacks, the SOC is becoming an increasingly important element of your company’s security.

Source: cyberuniversity.com
image

What is a SIEM?

The term SIEM is common among companies that care about the security of their data and their overall operations. Indeed, it is a tool that allows to manage at the same time security events and information within a company. On the one hand, the SIEM will record logs and analyze them in order to monitor in real time the compliance of IT events with a previously established process. On the other hand, the tool will ensure Security Information Management, i.e. the collection of security data and the necessary compliance analyses. In concrete terms, the SIEM will allow a company to centralize all security information in a single tool. Data collected from antivirus software, firewalls, servers, anti-theft protection and operating systems of all kinds will be analyzed in a single tool, leaving nothing to chance.

Source : nomios.fr
image