SOC as a Service

24/7 remote security montoring with modern SOC platform providing integrated SIEM, SOAR, and XDR capabilties.

The Value of a Security Operation Center (SOC)

Increase Security Visibility

Be better prepared for the next attack

Mnimize Breach Impact

Business disruption, brand damage, lost customers, lost revenue...

Keep Business Informed of Risk

Help the business better calculate and manage the risks associated with cyber threats

Stay Ahead of Attackers

Move beyond reactive security, to proactive threat hunting

Diagram 1.png

SOC

Reduce Respon Time

Take action to contain or disrupt the threat before it causes damage

Ensure Compliance

Ensure compliance (ISO-97011, HIPAA, CCPA, NIST...

Our Platform

13.png
Modern Cloud-based, Multi-tenanted Platform
  • Security Information Management

  • Threat Detection & Response

  • Auditing & Policy Monitoring

  • Regulatory Compliance

  • XDR

15.png
Key Features
  • Out-of-Box Support of 100+ data source

  • Log Collector Appliance/Virtual

  • Log Management

  • SIEM, SOAR, XDR

  • Threat Intel Feeds

  • Compliance Montoring

  • Established Playbooks/Runbooks

16.png
Managed Service
  • 24x7 Monitoring

  • Incident Response

       - Triage investigations

       - Recommendations

       - Follow-up on cases

       - SLA adherence

  • Threat Hunting

       - Emerging threat investigation

       - Customer-driven use cases

ATSOC Onboarding Process

Typical onboarding duration - approx. 4 -8 weeks
aa.png

24/7 Monitoring begins (fully operational)

Threat detection, investigation, hunting, response, reporting

17.png
18.png
19.png
21.png
1. KICKOFF & DISCOVERY
  • Team introductions

  • Review service packages purchased

  • Discuss client success criteria

  • Understand client IT environment

  • Identify data sources & any potential data onboarding issues

2. DATA INGESTION
  • Get client data flowing into ATSOC Command via APIs, or via ATSOC Connector if necessary

  • Validate that data is being parsed, cleansed, normalized, and enriched

  • Review and validate the required log sources have been fully onboarded

3. SOC ACTIVATION
  • Meet with ATSOC SOC team

  • Review SLAs

  • Review standard Playbooks

  • Creat custom client Runbook

  • Review escalation procedures

  • Ensure client team has access to ATSOC Command

4. TRAINING
  • Initial two-hour, instructor-led ATSOC Command training session

  • Explore ATSOC Knowledgebase (online)

  • Typically done once a week's worth of data has been ingested into Command

  • Learn how to use all the key features of ATSOC Command to do searches, investigate threats, interact with cases, and view and interpret dashboards

  • Follow-up session and additional training sessions if necessary

*Onboarding: Key Success Factors

1. Timely access to client resources (people, systems, permissions)

2. Clear understanding of client IT environment and data sources

3. Well-defined client success criteria