Security Information and Event Management (SIEM)
• Asset/ Log Source onboarding
• Continuous Integration
• Continuous Deployment
• Continuous management & upkeep of use cases
Security Orchestration Automation and Response (SOAR)
• Automation of actions
• Playbook creation and optimization
• Day-to-day management of paybooks and SOAR platform.
• Platform management and upkeep.
EndPoint Detection and Response (EDR)
• EDR Policy creation & Management
• Automated action configuration
• Continuous Integration/ Onboarding
Vulnerability Management (VM)*
• Configuration of Vul. Management Scanner.
• Periodic scanning of the assets.
• Support with vul. Tracking and remediation*
• Periodic reporting.
*Available as an additional service for client.
Cyber Threat Intelligence (CTI)
• Subscription to the threat intel database.
• Integration of the Threat Intel DB with SIEM, SOAR, EDR, etc.
Brand Protection*
• Domain monitoring
• Logo monitoring
• Social media monitoring
• Dark web monitoring
• User account monitoring
*Available as an additional service for client.
SOC ITSM
• Monitoring, ticketing & alerting
• Change & configuration management Incident management
• Monitoring
• Event management
• Service Catalog
SOC Assessment & Compliance Services*
• Integrated Controls Framework
• SOC Assessment
• Integrated controls based on industry standard regulations e.g., MTCIT, ISO,…
*Available as an additional service for client as an independent assessment against the best practices and regulations