SOC resources are at-the-ready to protect your assets
Our SOC is anchored on three pillars. People are the brains behind the SOC, technology is the brawn, and processes tie the people and technology together.
Our people work 24/7 to understand the nuances of your business. Our cost-effective services are provided from the Philippines; however, we can travel for short-term, onsite projects.
The technology we rely on is segregated into endpoint security tools (e.g., anti-virus, patch management, web and email filters) and data loss prevention tools for protecting laptops, desktops, and servers.
We conduct vulnerability assessment and penetration testing (VAPT) on critical systems. We also use security information and event management (SIEM) techniques to proactively monitor and correlate events to uncover suspicious network activities, forensics and reverse engineering to investigate incidents, intrusion prevention/detection systems (IPS/IDS) file integrity monitoring (FIM) tools to provide network perimeter defense, and firewall log analysis to monitor and authorize all traffic passing through the firewall.
The SOC’s back-end processes include governance, continual service improvement, escalations, and service management reporting to help you stay secure.