NA


    OEM


    CSP/14

Security Operations Center (SOC)

Cyber Threat, Incident Response, Log ingestion, SIEM, OSINT, Cyber Resilience Engineering Framework

Advanced security controls should be part of an integrated program that covers detection, orchestration, automation, analytics, incident response, measurement and reporting.

    QOS Technology




    NA


    OEM


    CSP/14


Differentiators

 

  1. Cyber Threat & Situational Awareness framework
  2. Incident Response mechanism
  3. Log ingestion from Dark Web Harvesting platform, Honeynet (or deception solutions), OSINT (open-source intelligence) and the IT assets hosting the business-critical information and data
  4. Effectiveness of SIEM is proportional to the telemetry of data collection and the spectrum of log collection

 

 

Solution

 

  1. Based on Cyber Resilience Engineering Framework (CREF)
  2. Provision for logs collection across the IT infrastructure
  3. Offer events correlation & security analytics
  4. Effective SIEM
  5. Periodic Vulnerability Assessments
  6. Privilege Identity and Access Management solution

 

 

Features

NA

Solution Components

NA

Frameworks

Gartner "Five Models of Security Operations Centre” SANS 2016 Survey for Security Analytics NCIPC & CERT-IN Guidelines"

Client end Requirment

NA

Support

NA

Training

 

  1. Number of modules: 3
  2. Module 1: Red team tactics
  3. Module 2: Blue team tactics with deployed security controls & SIEM analytics
  4. Module 3: Playing in cyber range
  5. Duration of training: 10 days

 

 

Scope

 

  1. Known, known attacks
  2. Known, unknown attacks
  3. Unknown, unknown attacks

 

 

Architechture

NA

Infrastructure/Operation

NA

Technical Specifications

NA

Target Clients

NA

Pricing / commercial model

NA

Use cases

NA

Differentiators

 

  1. Cyber Threat & Situational Awareness framework
  2. Incident Response mechanism
  3. Log ingestion from Dark Web Harvesting platform, Honeynet (or deception solutions), OSINT (open-source intelligence) and the IT assets hosting the business-critical information and data
  4. Effectiveness of SIEM is proportional to the telemetry of data collection and the spectrum of log collection

 

 

Solution

 

  1. Based on Cyber Resilience Engineering Framework (CREF)
  2. Provision for logs collection across the IT infrastructure
  3. Offer events correlation & security analytics
  4. Effective SIEM
  5. Periodic Vulnerability Assessments
  6. Privilege Identity and Access Management solution

 

 

Features

NA

Solution Components

NA

Frameworks

Gartner "Five Models of Security Operations Centre” SANS 2016 Survey for Security Analytics NCIPC & CERT-IN Guidelines"

Client end Requirment

NA

Support

NA

Training

 

  1. Number of modules: 3
  2. Module 1: Red team tactics
  3. Module 2: Blue team tactics with deployed security controls & SIEM analytics
  4. Module 3: Playing in cyber range
  5. Duration of training: 10 days

 

 

Scope

 

  1. Known, known attacks
  2. Known, unknown attacks
  3. Unknown, unknown attacks

 

 

Architechture

NA

Infrastructure/Operation

NA

Technical Specifications

NA

Target Clients

NA

Pricing / commercial model

NA

Use cases

NA

A Technologist's Expertise Company