
Managed SOC
WITH ALL EXTRAS
Digital infrastructures are becoming increasingly complex and monitoring all potential attack vectors is becoming increasingly difficult. Our Managed SOC protects digital infrastructures 24x7 with a high degree of automation, efficient processes, scalable technology, and a large-scale expert team. With the integrated cyber insurance, we also protect against possible financial damage.
SOC at us - only with People, Process, Products.
Let's talk about the SOC basics:

PEOPLE
Interdisciplinary teams set up 24x7 for your security.

PRODUCTS
Modern, scalable architectures with SIEM and SOAR with high flexibility when connecting sources.

PROCESSES
Efficient through clear responsibilities, processes, escalation levels & a high degree of automation.
People: INTERDISCIPLINARY TEAM
WITH WHITE HATS
AGAINST BLACK CATS
The SOC in Managed SOC - stands for Security Operations Center and is an organizational unit that would not exist without the expertise of the people who are active here. We are proud to have so many passionate experts for us and combine here Platform- and Detection-Engineers, Incident- and SOC-Analysts, DevOps, Consultants as well as Incident Managers. We train them continuously to be on the pulse of the times. We have already developed the appropriate defensive concept for new attack patterns. So we can provide individual Detection Rules and Playbooks for our partners.

Products: Protected 24/7 with Google + us
MANAGED SOC WITH
GOOGLE SPEED
We are Google Cloud Security Partner and proud to be one of the few providers to fully set up Google SecOps. Google has always occupied the field of finding and finding through analysis of the entire internet. With Google Security Operations there are clear dashboards that show anomalies immediately. Through the intuitive system, processes can be traced back to the last detail based on the corresponding log sources. Our analysts then enter a deep forensic investigation based on fixed processes and detection metrics if necessary. So we can immediately provide a Cyber-Kill-Chain. With Google SecOps, a SIEM and SOAR solution was brought to the market that impresses with enormous speed and the connection of the databases of Mandiant and Virustotal. These databases migrate under Google Threat Intelligence - short GTI -, the largest cyber database in the world.

Process: Standards ensure constant quality:
EXPERIENCED PROCESSES
ARE THE HEART
Unique processes and clear escalation levels create efficiency in Managed SOC. Just as a high degree of automation through Detection Rules & Playbooks. So analysts and analysts can focus exclusively on relevant alerts. This increases the effectiveness of the digital shield. If a critical alert is identified, our Incident Management process is immediately started with the provision of an Incident Manager as well as the CIRT.

Incident Response/Process: In case of emergency – immediate response
FULL SERVICE
INCIDENT HANDLING
It is often forgotten that a security incident is a business crisis. In crises, chaos often reigns and when cross-cutting issues have to be dealt with, many departments have to contribute. Not only forensic work, but also management, communication and legal are areas that are assigned special roles. With our framework, you get all areas from one hand.

Offering: Our Bundles for Your Security
WITH MANAGED SOC TO
BUSINESS RESILIENCY
Essential
Service Review Meetings: p. Quartal
- Sources: 1x EDR, 1x Entra ID
- PT Quota: 2 PT
- Cyberaudit
- IR Retainer
- 24x7 Monitoring & Response
- Threat Intelligence
- suresecure Use Case Library
- Service Management (CSM)
- SOAR (SaaS)
- Vulnerability Management
Advanced
Service Review Meetings: p. Monat
Includes all Essential Features
- Sources: Cloud sources + 1x On Prem AD
- PT Quota: 4 PT
- Incident Drill
Premium
Service Review Meetings: p. Monat
Includes all Essential & Advanced Features
- Includes all Essential & Advanced Features
- Sources: All
- PT Quota: 6 PT
- SIEM (SaaS)
- Cyber Insurance
Possible Add-Ons: Expand the Managed SOC flexibly
Options have,
instead of need.
DIGITAL THREAT MONITORING

Early data leaks
Continuous search for stolen data, compromised identities, and information about exposed infrastructure
Stolen data
Compromised identities
Information about exposed infrastructure
Individuals and data associated with them
With Digital Threat Monitoring (DTM) you are one step ahead of digital risks.
ATTACK SURFACE MANAGEMENT

Your Internet Assets
Continuous external ecosystem vulnerability assessment (daily, weekly, as needed)
Inventory of assets running in the external ecosystem
Active asset assessment based on Mandiant-IOCs and Frontline-Intelligence to analyze and evaluate vulnerabilities
With ASM, the feeling for your own attack surface becomes reality.
OT-SECURITY

Basics for OT
Establish visibility: You can only protect what you also see
Consider criticality: Build a digital twin instead of a live intervention in the environment
Assessment of environment and compliance: Evaluate the attack surface and derive action measures
We bring light into the production halls with context-based exposure management.
YOUR PATH TO MANAGED SOC
ONBOARDING &
PRICING




Preparation
Preparation Phase
Preparation of all relevant information for the onboarding project by our transition manager
Project Kick-Off
Start of the onboarding project with all stakeholders
Implementation
Onboarding Phase
Implementation has started – our technical onboarding team is at your side
Start Service Contract
Finalization of the last task packages
Finalization of the last task packages
Last technical adjustments and tests
Delivery
Completion of Onboarding
Complete monitoring by the Security Operations Center + insurance protection

Let's talk to each other:
Joel Da Cunha Gorgueira
Account Executive