Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Hall 7 / Booth Number 7-105

Security Operations Center

Categories

Counter-intelligence APT protection SIEM Security information and event management Security management Vulnerability and patch management Risk analysis and management Log management IT service management Intrusion detection / prevention High availability Cyber-physical systems security Cloud (computing) security Data center security Asset management / IT documentation Storage solutions Server-based computing Interface protection / Device management Unified threat management (UTM) / security appliances Threat analysis Business continuity Compliance / GRC (products and services) Planning of data centers and IT infrastructures Managed security services BSI IT baseline protection ISMS (ISO-IEC 2700x / BS 7799) Forensics Consulting IT security Network security Certification of products and services Education / training / qualification Auditing Data protection, data security Data recovery Data deletion Data leakage / loss prevention Firewalls Computer emergency response team (CERT) Virtualization Application security

Key Facts

  • SOC
  • Security Operations Center
  • SOC 24/7

Product Description

How does modern IT security management work? In view of increasingly complex threats, what basic conditions do companies need to create for this?

 

The wealth of systems available to protect a company from cyber attacks is enormous. The threats to which IT is exposed are just as diverse. Today, a new firewall rule no longer provides adequate protection. In a Security Operations Center (SOC), specialized IT security s monitor all existing security tools - around the clock, seven days a week. A SIEM as the heart of IT security and a comprehensive risk and vulnerability management are crucial for successful operation.

 

Experts from AirITSystems will be happy to explain to you which technical components make up an efficient SOC and why, ideally, operations should not be organizationally located with the firewall administrators. They will show you which building blocks of a SOC companies can cover well in their own operations and when it makes sense to purchase services "as a service". And that also 24/7.

 

Shock or SOC? Download whitepaper: https://www.airitsystems.de/leistungen/it-sicherheit/security-operation-center-soc/soc-whitepaper

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.