Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Service

Hall 7 / Booth Number 7-103

Security Operations Center

Categories

Intrusion detection / prevention IT service management Log management Penetration tests Risk analysis and management Vulnerability and patch management High availability Security management SIEM Security information and event management APT protection Anti-spam solutions Counter-intelligence Systems management Unified threat management (UTM) / security appliances Security test suite Endpoint security Email security Cyber-physical systems security Mobile device managment Mobile security Network security Physical IT-security Interface protection / Device management Server-based computing Storage solutions VoIP security Web application security Asset management / IT documentation Data center security Bandwidth management Big data Security Cloud (computing) security Content security Anti-virus and malware protection Hardware security Backup solutions Business continuity Remote access (VPN) Awareness Auditing Education / training / qualification Virtualization Consulting IT security Network access control (NAC) Forensics BSI IT baseline protection Managed security services Planning of data centers and IT infrastructures Public key infrastructure ISMS (ISO-IEC 2700x / BS 7799) License management Identity and access management Electronic signatures Compliance / GRC (products and services) Computer emergency response team (CERT) Denial of service protection Firewalls Archiving / Long-term storage Data leakage / loss prevention Data deletion Data recovery Data protection, data security Authentication Single sign-on Access protection Admission control User (rights) management Biometrics Threat analysis Application security

Key Facts

  • SOC
  • Security Operations Center
  • SOC 24/7

Product Description

How does modern IT security management work? In view of increasingly complex threats, what basic conditions do companies need to create for this?

 

The wealth of systems available to protect a company from cyber attacks is enormous. The threats to which IT is exposed are just as diverse. Today, a new firewall rule no longer provides adequate protection. In a Security Operations Center (SOC), specialized IT security s monitor all existing security tools - around the clock, seven days a week. A SIEM as the heart of IT security and a comprehensive risk and vulnerability management are crucial for successful operation.

 

Experts from AirITSystems will be happy to explain to you which technical components make up an efficient SOC and why, ideally, operations should not be organizationally located with the firewall administrators. They will show you which building blocks of a SOC companies can cover well in their own operations and when it makes sense to purchase services "as a service". And that also 24/7.

 

Shock or SOC? Download whitepaper: https://www.airitsystems.de/leistungen/it-sicherheit/security-operation-center-soc/soc-whitepaper

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.