You are on page 1of 24

SOC as a Service

Market forecast and sales approach

Márton Miklos – CEO


www.linkedin.com/in/martonmiklos
www.acpmit.com
THE SOC AS A SERVICE
Is a cloud-based security service, which helps enterprises
outsource their security operation
Provides real-time analysis of security alerts and maintains a
secure environment across an organization’s IT infrastructure by
ensuring continuity of business operations.
A dedicated team of information security experts that are
responsible for analyzing and monitoring the organization
security posture 24/7.
The service incorporates various regulations into their offerings
to maintain the security and privacy of the customers’ data and
ensure compliance across enterprise assets.
The cloud-based SOC as a service model is favorable for
customers due to various factors, such as scalability, streamlined
delivery mechanism, attractive pricing, and reduced overhead in
the management of hardware.
PREVENTION SERVICE
Prevention service helps organizations monitor the network traffic
and respond to cyber-attacks in the real-time.
This service protects enterprise infrastructure from cyber threats,
such as ransomware, phishing, and botnets.
Preventive service is extremely popular in SMEs, as they
overcome the tide of sophisticated and blended threats, and
secure business-critical broadband internet connections.
Moreover, they are cost-effective and handle all the security
functions of an entire network.
DETECTION SERVICE
The detection service provides the ability to detect fraudulent
activities across the enterprise network rapidly and responds to
cyber incidents quickly and more effectively.
Moreover, this service reduces the incident response time,
improves the overall effectiveness of the security infrastructure,
and minimizes the cyber breach impact on networks, endpoints,
and applications.
The detection service identifies and categorizes incidents and
events, and analyzes them. Further, it provides reports on
security-related incidents and events, and sends alerts on
analyzing any malicious activity.
INCIDENT RESPONSE SERVICE
Incident response service refers to a predefined and an
organized set of procedures and approaches that need to be
followed in the event of cyber-attacks, which are sometimes
known as cyber incidents, security incidents, and Information
Technology (IT) incidents. It is a systematic process to manage
and address the complex cyber-attacks post detection and help
enterprises recover IT damages and data losses.
Incident response service helps organizations handle and
manage not only the aftermath of the attacks but also define a
clear set of protocols that need to be followed before and during
security incidents. These security incidents are handled by the
Computer Security Incident Response Team (CSIRT) of
organizations, thereby helping reduce the total cost and time
involved in recovering from security incidents..
THE BIG DILEMMA
Cybersecurity issues are becoming a day-to-day struggle for
businesses and even with significant cybersecurity investments.
Not just large, but many middle-sized companies are forced to
face security challenges even though they have limited or zero
on-staff cybersecurity expertise.
A SOC is a centralized organizational unit dealing with IT security
issues.
Starts with the detailed analysis of vast amounts of data obtained
from organizational devices, forensic investigations and crisis
operations, and is peaking in rapid response to security alerts.
A SOC’s ultimate goal is to establish a more preventive attitude
towards security issues, while locating and focusing on real
security threats to an organization.
WHY CHOOSE SOC AS A SERVICE
Establishing and operating an in-house Security Operation is:
• time-consuming;
• not cost-efficient, and
• an unnecessary, overly demanding effort.
This lies in the life-cycle process of establishing and operating
an SOC since to establish and run a SOC infrastructure you
need:
• expert staff
• carefully selected hardware and software
• recurring trainings,
• international compliance and a 24/7 operation
This is too much to implement for a regular mid-sized or even for
some large companies, and also do not pay off in the long term
TAI SOC AS A SERVICE IN DETAIL
An end-to-end cyber security solution combining powerful software with a suite
of SOC services, to deliver both foundational security and highly advanced
protection.
• 24/7 threat analysis and detection, mitigation, remediation;
• constant monitoring of the IT infrastructure logs, devices, networks and critical
applications
• continuous scanning and analysis of millions of events
• Automatic and human assisted threat analysis and ranking with risk scoring
and alert thresholds
• Enhanced reporting capabilities
• Compliance assurance to industry standards with audit
ready reports;
TAISOC as a Service only requires a point of contact from the client (usually
Head of IT Security, IT operations, or other relevant position) who can be
reached, should there be a serious security incident discovered by our SOC
personnel.
PRICING
The TAISOC as a Service is a customizable solution that
matches our clients requirements. We conduct specific SOC
surveys to map the client’s system and security requirements;
fore every personalized proposal, we provide an expert who can
assess your company’s needs based on the following areas:
• targeted infrastructure components;
• number of infrastructure endpoints
• log storage retention requirements;
• number of Events Per Seconds (EPS)
• coverage hours and response time SLAs
• compliance requirements;
We are glad to receive your contact to provide you with free of
charge assessment of your organization’s IT security and SOC
needs.
“The SOC as a Service” Business Model

Installed on
No licence fee Monthly fee
systems in place
• Open source • Scalable • No added costs
solutions • Client only pays for • No need for new
• Custom-made in- what she needs technology
house (usually)

Ready to use Potential add-ons


• Ongoing security monitoring • IT security strategy planning
• Incident response • Strategy implementation
• Automated reports support
• Ticketing
20
The TAISOC Infrastructure advantage

No requirements for
Almost turn-key Design and
highly-priced new
process for the client implementation:
hardware, can run on
with minimal input 3 months
most existing systems

Battle-tested
Staff training combination of open-
source and proprietary
tools in bespoke
implementation

21
The TAISOC Infrastructure

22
OUR EXPERTS
Our international team of experts has 20+ years of
experience in IT audit, IT project management and IT security.
Most of our colleagues gained experience as working in
international corporations or working on the operative side of
information technology.
WHY WORK WITH US?
• 20+ years of experience
• Large projects with international organizations and
enterprises
• Research and development of proprietary ethical hacking
tools
• Development of custom exploits
• Security testing of know operating systems and software
• Audit methodology based on international IT security
standards (OWASP, BSI, CC)
• Professional resources with international certificates (CISSP,
CEH, OSCP, CISA, CISM, ISO)

We build SOC on Premise or provide Virtual SOC

You might also like