/demo/suresecure_realistic_photo_of_a_cyberexpert_stand_before_a_robo.png

Managed SOC
WITH ALL EXTRAS

Digital infrastructures are becoming increasingly complex and monitoring all potential attack vectors is becoming increasingly difficult. Our Managed SOC protects digital infrastructures 24x7 with a high degree of automation, efficient processes, scalable technology, and a large-scale expert team. With the integrated cyber insurance, we also protect against possible financial damage.

SOC at us - only with People, Process, Products.

Let's talk about the SOC basics:

Cyberaudit logo
PEOPLE

Interdisciplinary teams set up 24x7 for your security.

Cyberaudit logo
PRODUCTS

Modern, scalable architectures with SIEM and SOAR with high flexibility when connecting sources.

Cyberaudit logo
PROCESSES

Efficient through clear responsibilities, processes, escalation levels & a high degree of automation.

People: INTERDISCIPLINARY TEAM

WITH WHITE HATS
AGAINST BLACK CATS

The SOC in Managed SOC - stands for Security Operations Center and is an organizational unit that would not exist without the expertise of the people who are active here. We are proud to have so many passionate experts for us and combine here Platform- and Detection-Engineers, Incident- and SOC-Analysts, DevOps, Consultants as well as Incident Managers. We train them continuously to be on the pulse of the times. We have already developed the appropriate defensive concept for new attack patterns. So we can provide individual Detection Rules and Playbooks for our partners.

People: INTERDISCIPLINARY TEAM

Products: Protected 24/7 with Google + us

MANAGED SOC WITH
GOOGLE SPEED

We are Google Cloud Security Partner and proud to be one of the few providers to fully set up Google SecOps. Google has always occupied the field of finding and finding through analysis of the entire internet. With Google Security Operations there are clear dashboards that show anomalies immediately. Through the intuitive system, processes can be traced back to the last detail based on the corresponding log sources. Our analysts then enter a deep forensic investigation based on fixed processes and detection metrics if necessary. So we can immediately provide a Cyber-Kill-Chain. With Google SecOps, a SIEM and SOAR solution was brought to the market that impresses with enormous speed and the connection of the databases of Mandiant and Virustotal. These databases migrate under Google Threat Intelligence - short GTI -, the largest cyber database in the world.

Products: Protected 24/7 with Google + us

Process: Standards ensure constant quality:

EXPERIENCED PROCESSES
ARE THE HEART

Unique processes and clear escalation levels create efficiency in Managed SOC. Just as a high degree of automation through Detection Rules & Playbooks. So analysts and analysts can focus exclusively on relevant alerts. This increases the effectiveness of the digital shield. If a critical alert is identified, our Incident Management process is immediately started with the provision of an Incident Manager as well as the CIRT.

Process: Standards ensure constant quality:

Incident Response/Process: In case of emergency – immediate response

FULL SERVICE
INCIDENT HANDLING

It is often forgotten that a security incident is a business crisis. In crises, chaos often reigns and when cross-cutting issues have to be dealt with, many departments have to contribute. Not only forensic work, but also management, communication and legal are areas that are assigned special roles. With our framework, you get all areas from one hand.

Incident Response/Process: In case of emergency – immediate response

Offering: Our Bundles for Your Security

WITH MANAGED SOC TO
BUSINESS RESILIENCY

Essential

Service Review Meetings: p. Quartal

  • Sources: 1x EDR, 1x Entra ID
  • PT Quota: 2 PT
  • Cyberaudit
  • IR Retainer
  • 24x7 Monitoring & Response
  • Threat Intelligence
  • suresecure Use Case Library
  • Service Management (CSM)
  • SOAR (SaaS)
  • Vulnerability Management

Advanced

Service Review Meetings: p. Monat

Includes all Essential Features

  • Sources: Cloud sources + 1x On Prem AD
  • PT Quota: 4 PT
  • Incident Drill

Premium

Service Review Meetings: p. Monat

Includes all Essential & Advanced Features

  • Includes all Essential & Advanced Features
  • Sources: All
  • PT Quota: 6 PT
  • SIEM (SaaS)
  • Cyber Insurance

Possible Add-Ons: Expand the Managed SOC flexibly

Options have,
instead of need.

DIGITAL THREAT MONITORING

DIGITAL THREAT MONITORING

Early data leaks

  • Continuous search for stolen data, compromised identities, and information about exposed infrastructure

    • Stolen data

    • Compromised identities

    • Information about exposed infrastructure

    • Individuals and data associated with them

With Digital Threat Monitoring (DTM) you are one step ahead of digital risks.

ATTACK SURFACE MANAGEMENT

ATTACK SURFACE MANAGEMENT

Your Internet Assets

  • Continuous external ecosystem vulnerability assessment (daily, weekly, as needed)

  • Inventory of assets running in the external ecosystem

  • Active asset assessment based on Mandiant-IOCs and Frontline-Intelligence to analyze and evaluate vulnerabilities

With ASM, the feeling for your own attack surface becomes reality.

OT-SECURITY

OT-SECURITY

Basics for OT

  • Establish visibility: You can only protect what you also see

  • Consider criticality: Build a digital twin instead of a live intervention in the environment

  • Assessment of environment and compliance: Evaluate the attack surface and derive action measures

We bring light into the production halls with context-based exposure management.

YOUR PATH TO MANAGED SOC

ONBOARDING &
PRICING

Preparation

Week 1

Preparation Phase

Preparation of all relevant information for the onboarding project by our transition manager

Week 2

Project Kick-Off

Start of the onboarding project with all stakeholders

Implementation

Week 3

Onboarding Phase

Implementation has started – our technical onboarding team is at your side

Week 4

Start Service Contract

Finalization of the last task packages

Week 5

Finalization of the last task packages

Last technical adjustments and tests

Delivery

Week 6

Completion of Onboarding

Complete monitoring by the Security Operations Center + insurance protection

Personal

Let's talk to each other:

Joel Da Cunha Gorgueira

Account Executive

Frequently Asked Questions