Customer Security Operations Centre (CSOC)

Contact
CSOC (SVG)

Security professionals are bombarded with a huge number of events daily, making triage a difficult and time-consuming task

By outsourcing the security operations, customers are able to focus on business-as-usual activities with the knowledge security professionals are actively threat hunting, providing high fidelity alerts and utilising interactive playbooks to thwart a breach.

A Customer SOC’s function takes away the difficult task of looking through each event to ensure the appropriate response is enacted upon. This is broken down into three distinct areas:

Preventative actions are essential to stopping an attack, while limiting the damage caused through the nefarious behaviour. This is done by:

A

Preventing phishing attacks reaching the intended target

A

Preventing missing patch updates, which would leave the organisation vulnerable

A

Preventing unauthorised applications being downloaded or used in the corporate environment

A

Preventing ransomware and malware attacks

A

Preventing unauthorised account access to systems

Detecting an adversary is a specialist task, which require the need of advanced forensic tools to understand how and when the threat actor breached the network and most importantly, what damage has been caused. To stay ahead of the attacker Customer SOC's look:

A

To detect privileged account escalation, which allows lateral movement from compromised systems

A

To detect contact with suspicious internal and external internet/intranet sites

A

To detect suspicious user activity across the network

A

To detect sensitive corporate data exfiltration

A

To detect suspicious software use in compromised accounts

React: once the threat actor has been identified, analysts need to counter the exposure, by:

A

Reacting to quickly isolate compromised devices

A

Blocking access to suspicious sites

A

Supporting with in-depth forensic analysis of the attack lifecycle

A

Stopping unauthorised active processes

A

Removing malicious files or emails on compromised endpoints

Capabilities:

A

Log ingestion through SIEM tools

A

Proactive threat hunting

A

Provide automated vulnerability remediation

A

Provide log retention for forensic lookback and for compliance and regulation

A

Provide in-depth endpoint vulnerability context

A

High fidelity alerts

LOGO (SVG)

Focussed on business systems integration and world leading vendor alignment, we have deployed many solutions over a prolonged and successful history

Keeping up with continual IT change and expanding a range of technologies, we have become the leading, preferred and often sole IT partner for many South West & Wales businesses.

Technology Investing

We have weathered the commercial storms of recession and made significant personnel investment across all areas of our business. We are proud to continue to strengthen and grow.

Extensive portfolio of products and services

Offering an extensive portfolio of products and services, developed many solutions to suit any type of business.

Service Transitions

Supporting businesses with the transition from Microsoft 2003 server, Exchange 2003 and Windows XP to the newer versions of Microsoft 2008/2012 server.

Best Pricing

Our procurement team have an extensive range of supplier relationships, ensuring the best pricing is gained to offer the most comprehensive solutions.

How can BOM IT Solutions help?

Many organisations only review their cyber security capabilities when a breach has already occurred. Importantly, the cost of a breach can often run into the hundreds of thousands-far outweighing the cost of proactively assessing your level of cyber security.

0800 038 7222

Call for a consultation.

sales@bom.co.uk

Email BOM IT Solutions.

Contact BOM IT Solutions