IT security2. November 20222 min reading time
SOC - Modular security for your company
EDR, SIEM, NSM, USW: Modular security for your company
Early detection and rapid action are the keys to successfully defending against cyber attacks. KBC's Security Operation Center (CDC) offers you a range of modules that can be expanded at any time according to requirements and needs. Early detection for IT and OT with concentrated visibility and cost transparency for holistic cybersecurity measures in your company.
Our services at a glance:
- Endpoint Detection and Response EDR: For the detection of security-relevant anomalies in end devices.
Our EDR solution uses mathematical and statistical modeling to detect and protect endpoints such as servers, PCs and notebooks against viruses, spyware and ransomware, for example. - Operational Technology Security OT: For the protection of industrial production environments.
OT comprises systems in industrial production processes. These are necessary for controlling and monitoring machines and other systems. OT security solutions from K-Businesscom (KBC) are specially designed for the availability and continuous monitoring of corresponding communication and operating processes. Alerts are sent in real time in the event of system-critical attacks and vulnerabilities. - Security Information Event Management SIEM: For analyzing log data from IT / OT infrastructures.
Cyber criminals can find a gateway almost anywhere. A special tool known as log analysis has been developed to provide a company-wide view of the security situation. This collects, aggregates and analyzes log data from a wide range of systems, including globally distributed systems, directly on the CDC platform. Critical incidents and alarms are communicated directly to KBC customers. - Network Security Monitoring (NSM): For the identification of anomalies, malware and other threats in network traffic.
The use of NSM provides deep insights into what is happening in networks: What suspicious events are happening? Who is in the network without authorization? The customer's traffic is mapped and tracked on CDC's own servers. A wide variety of methods are used to identify anomalies, e.g. proprietary intrusion detection signatures or intelligent feeds. - Vulnerability Scanning VULN: For the detection of obvious and hidden vulnerabilities.
Intelligent vulnerability management with continuous analyses to identify and establish sustainable optimization measures. The scans run at regular intervals across the critical systems of the customer infrastructure. - Threat Intelligence TI: For the automated search for business-critical information.
The CDC's TI methods are used to search a wide variety of sources, including closed forums and the dark web, for processes and information that could indicate an attack. If such information is found, it is analyzed immediately and the customer is informed of the results.
Which is the right entry-level module for more security in your company? Contact us and we'll find out together!
Contact
CANCOM Austria
Start right away