Cybersecurity: a vast perimeter to defend, played on multiple chessboards.
Our solution adapts and connects to most technologies on the market to ensure the collection of maximum information and the protection of all your assets.
The collectors are installed in your systems, collect the information, and send it to our SIEM which then takes care of the analysis, correlation, and alerts.
What does SIEM mean?
As an organization, you should be able to continue to be at your best today and build your future with peace of mind. We take care of the cyber threat and its harmful consequences for the conduct of your business.
The strength of our service
The strength of our team
CONSOLIDATE / UNDERSTAND / REMEDY
SIEM Managed Security Service
Comparison of managed SOC / SIEM services
|Security event management||Management and monitoring of security events|
|Monthly report||Monthly report and dashboard that summarizes events by category|
|Incident management||Setting up the right playbooks for your business to handle incidents|
|8/5 Alerts||8/5 communication of High Category Alerts|
|24/7 Alerts||24/7 communication of High Category Alerts|
|Multi-Manufacturers Collector||Our solution connects to the majority of technologies on the market|
|Event archiving||Archive of medium- and long-term events|
|Multi-level alerts||Multi-level alerts on data movements, atypical behaviors, deviations, and geolocation|
|AI analysis||Use of machine learning to continuously improve responsiveness to the different identified behaviours|
|Integration API||SIEM has a REST API that allows any external system to integrate into the CMDB, make event queries and send alerts|
|Automation of actions||The majority of actions can be automated through use cases and scripts|
|Monthly Vulnerability Report and Meeting||A report and a meeting with a cybersecurity expert to discuss identified events and recommendations|
|Quarterly Report and Vulnerability Meeting||A report and a meeting with a cybersecurity expert to discuss identified events and recommendations|
|Recognition of abnormal human activity (UEBA)||After learning about a person’s normal behaviour, the system will be able to identify and react to any out-of-the-ordinary behaviour according to the pre-established parameters|
|Dark Web monitoring||Continuous monitoring of your credentials (passwords) on the Dark Web|