The Value of a Security Operation Center (SOC)
Increase Security Visibility
Be better prepared for the next attack
Mnimize Breach Impact
Business disruption, brand damage, lost customers, lost revenue...
Keep Business Informed of Risk
Help the business better calculate and manage the risks associated with cyber threats
Stay Ahead of Attackers
Move beyond reactive security, to proactive threat hunting

SOC
Reduce Respon Time
Take action to contain or disrupt the threat before it causes damage
Ensure Compliance
Ensure compliance (ISO-97011, HIPAA, CCPA, NIST...
SOC as a Service Indonesia SOC as a Service harga SOC as a Service provider di Indonesia SOC as a Service vendor di Indonesia SOC as a Service Jakarta SOC as a Service Jakarta Selatan SOC as a Service Surabaya SOC as a Service Bandung SOC as a Service Bali SOC as a Service Yogyakarta SOC as a Service Makassar SOC as a Service Medan SOC as a Service keamanan siber SOC as a Service manajemen risiko SOC as a Service monitoring SOC as a Service deteksi ancaman SOC as a Service respons insiden SOC as a Service keamanan jaringan SOC as a Service layanan manajemen SIEM SOC as a Service layanan manajemen log
Our Platform

Modern Cloud-based, Multi-tenanted Platform
-
Security Information Management
-
Threat Detection & Response
-
Auditing & Policy Monitoring
-
Regulatory Compliance
-
XDR

Key Features
-
Out-of-Box Support of 100+ data source
-
Log Collector Appliance/Virtual
-
Log Management
-
SIEM, SOAR, XDR
-
Threat Intel Feeds
-
Compliance Montoring
-
Established Playbooks/Runbooks

Managed Service
-
24x7 Monitoring
-
Incident Response
- Triage investigations
- Recommendations
- Follow-up on cases
- SLA adherence
-
Threat Hunting
- Emerging threat investigation
- Customer-driven use cases
ATSOC Onboarding Process
Typical onboarding duration - approx. 4 -8 weeks

24/7 Monitoring begins (fully operational)
Threat detection, investigation, hunting, response, reporting




1. KICKOFF & DISCOVERY
-
Team introductions
-
Review service packages purchased
-
Discuss client success criteria
-
Understand client IT environment
-
Identify data sources & any potential data onboarding issues
2. DATA INGESTION
-
Get client data flowing into ATSOC Command via APIs, or via ATSOC Connector if necessary
-
Validate that data is being parsed, cleansed, normalized, and enriched
-
Review and validate the required log sources have been fully onboarded
3. SOC ACTIVATION
-
Meet with ATSOC SOC team
-
Review SLAs
-
Review standard Playbooks
-
Creat custom client Runbook
-
Review escalation procedures
-
Ensure client team has access to ATSOC Command
4. TRAINING
-
Initial two-hour, instructor-led ATSOC Command training session
-
Explore ATSOC Knowledgebase (online)
-
Typically done once a week's worth of data has been ingested into Command
-
Learn how to use all the key features of ATSOC Command to do searches, investigate threats, interact with cases, and view and interpret dashboards
-
Follow-up session and additional training sessions if necessary
*Onboarding: Key Success Factors
1. Timely access to client resources (people, systems, permissions)
2. Clear understanding of client IT environment and data sources
3. Well-defined client success criteria
-
Security Operations Center (SOC)
-
Cybersecurity
-
Threat detection
-
Incident response
-
Security monitoring
-
SIEM (Security Information and Event Management)
-
IDS/IPS (Intrusion Detection System/Intrusion Prevention System)
-
Firewall
-
Vulnerability management
-
Risk management
-
Log management
-
Security management
-
Managed security services
-
Cyber defense
-
Network security
-
Cloud security
-
Threat intelligence
-
SOC analyst
-
Security automation
-
Service level agreement (SLA)