SlideShare a Scribd company logo
Security Operation Center
An integrated
Security Operation Center
Our Goals
SOC Portfolio
Global delivery center with plug and play platform.
Expensive malware management with a unified & real-time response.
Effective analysis and detection of threat.
Advanced Security Monitoring Managed SOC Comprehensive Analytics
Detecting threats, vulnerabilities and
malware at the earliest stage. With SOC
network experts, you can ensure complete
security of your enterprise.
16+ years of experience in cyber security
operations, we provide advanced technical
skills to mitigate security threats.
Our experts monitor the frequently
changing threat scenario and analyze
cross-platform threats to offer a
wide range of IT security.
Data
Aware
Business
Aware
Risk
Aware
Env.
Aware
Identity
Aware
Reporting
Correlation
Contextulization
Log Collection
Reference
Model
For more information:
For more information:
info@skill-mine.com
For commercial information:
orders@skill-mine.com www.skill-mine.com
Technology Consulting Services
Skillmine
(Design &
Implement)
(Run the SOC for a
defined Period)
(Transition Processes
& People)
Build Operate Transfer
01 02 03
Detect
Prevent
Control
Product
Event Monitoring
Event Analysis
Event Processing
Event Reporting
Overall Site Analysis
Process
3 Layer Structure
Underpinning
Knowledge Base
Shift Rotation
Lean and Efficient
People
Skillmine’s Approach
Guidance
& Planning
Define objectives and
requirements that will
govern the design and
use of SIEM.
Infrastructure
Define, Design and
implement servers,
software, log collectors
etc comprising the
SIEM system
architecture.
Implementation
Design. Integrate and
implement components
needed to generate
alerts and visibility.
Operations
& Support
Define and manage
processes needed to
ensure ongoing support,
management and
tuning of SIEM.
Incident
Response
Build, test, and respond
to contain and eradicate
the threat.
Metrics &
Reporting
Establish measurement,
reporting and
communication
capabilities to
demonstrate
changing
state on Security.
Enhance
Continuously Improve &
Enhance the solution
capabilities based on
new requirements and
gain operational
effciencies.
01
02
03
04
05
06
07

More Related Content

Security operation center.pdf

  • 1. Security Operation Center An integrated Security Operation Center Our Goals SOC Portfolio Global delivery center with plug and play platform. Expensive malware management with a unified & real-time response. Effective analysis and detection of threat. Advanced Security Monitoring Managed SOC Comprehensive Analytics Detecting threats, vulnerabilities and malware at the earliest stage. With SOC network experts, you can ensure complete security of your enterprise. 16+ years of experience in cyber security operations, we provide advanced technical skills to mitigate security threats. Our experts monitor the frequently changing threat scenario and analyze cross-platform threats to offer a wide range of IT security. Data Aware Business Aware Risk Aware Env. Aware Identity Aware Reporting Correlation Contextulization Log Collection Reference Model
  • 2. For more information: For more information: [email protected] For commercial information: [email protected] www.skill-mine.com Technology Consulting Services Skillmine (Design & Implement) (Run the SOC for a defined Period) (Transition Processes & People) Build Operate Transfer 01 02 03 Detect Prevent Control Product Event Monitoring Event Analysis Event Processing Event Reporting Overall Site Analysis Process 3 Layer Structure Underpinning Knowledge Base Shift Rotation Lean and Efficient People Skillmine’s Approach Guidance & Planning Define objectives and requirements that will govern the design and use of SIEM. Infrastructure Define, Design and implement servers, software, log collectors etc comprising the SIEM system architecture. Implementation Design. Integrate and implement components needed to generate alerts and visibility. Operations & Support Define and manage processes needed to ensure ongoing support, management and tuning of SIEM. Incident Response Build, test, and respond to contain and eradicate the threat. Metrics & Reporting Establish measurement, reporting and communication capabilities to demonstrate changing state on Security. Enhance Continuously Improve & Enhance the solution capabilities based on new requirements and gain operational effciencies. 01 02 03 04 05 06 07