SOC
SOC
By Atea
Reduce the risk of cyber attacks – and the consequences Many cyber attacks could have been avoided, and in those cases where the attack has occurred in the first place, the downtime and costs associated with the attack could have been reduced considerably.
Delivery method
In order to uncover a security breach, it is important to collect data from all relevant log sources. Our experience and expertise mean that we can get the systems back up and running quickly after a security incident. In the aftermath of a possible attack, Atea IRT will work together with the business to analyze and verify the attack, determine the scope and consequences, carry out measures to limit damage, as well as clean up and restore normal operations again as soon as possible.
Collects data
In order to uncover a security breach, it is important to collect data from all relevant log sources. At the start of a SOC+ project, we create a description of all data and log sources from our own on-prem solutions, as well as public and hybrid cloud solutions. For example, log data from servers, network equipment, firewalls, clients, users, IoT devices and others.
IRT
Our experience and expertise mean that we can get the systems back up and running quickly after a security incident. In the aftermath of a possible attack, Atea IRT will work together with the business to analyze and verify the attack, determine the scope and consequences, carry out measures to limit damage, as well as clean up and restore normal operations again as soon as possible. The IRT personnel will also collect and handle evidence, and prepare a concrete and fact-based incident report.
Data in context
When data from logs flows into our SIEM tool, the data is compiled to detect in real time all abnormal events, activities and user behavior across all systems. The data is viewed in connection with the latest threat information, also if there are special things to be aware of with regard to the industry in which the business operates.
Pricing summary
Plans starting at
Unlimited log sources
SaaS
on-prem or hybrid