INFORMATION SECURITY MONITORING AND OPERATION CENTER – SOC

Information Security Operation and Monitoring Center (ATTT) – SOC is a system that helps continuously monitor and improve the security situation of an organization.
VSEC’s Information Security Operation and Monitoring Center (SOC) is a combination of processes – technology – people, enabling effective incident detection, analysis and response. Comprised of a set of processes, technologies, and a team of trusted security analysts, our SOC provides complete visibility and management of your business’s entire IT system and its security system.

“We have the ability to centrally manage the entire system of the organization, which reduces the time, cost and risk of attacks from all sides.”

Mr. Trương Đức Lượng – CEO

SOC SERVICES PROVIDE PEOPLE, PROCESS AND TECHNOLOGY

SOC is the perfect combination of 3 core values ​​in the field of Information Technology and Information Security, including: People – Technology – Process, this is always a solid defensive wall for the organization against threats in cyberspace.

    PEOPLE: Experts in the SOC, clearly tasked to run the system. The SOC consists of highly specialized security analysts and engineers, along with a 24/7 monitoring team to help ensure everything is running smoothly. These are professionals specially trained to monitor and manage security threats. Not only are they skilled in using a variety of security tools, but they also know the specific processes to follow in the event of an infrastructure breach

    TECHNOLOGY: Solutions for monitoring, analysis, problem detection and follow-up investigation. SOC includes a set of tools in a diverse technological system to help cybersecurity analysts continuously monitor security activities within an organization’s IT infrastructure. Members of the security team stationed at the Security Operations Center use these tools to identify, categorize, analyze incidents and events, and ultimately decide how to respond to these events, etc.

    PROCESS: Information security regulations, processes and policies implemented on the system. Standards and processes are developed to establish optimal operating procedures in emergency situations. Processes should be in line with international standards but tailored to the needs of the organization. Standard Operating Procedures, Incident Response Plans, etc., for minimal, moderate to high severity and risk situations.

FORMS OF SERVICE PROVISION

VSEC provides many different service packages to suit different status, needs and conditions of customers, including:

Building on-premise SOC system for customers (SOC Build)
Consulting, building, providing and deploying processes, technology and people for SOC at customer’s data center including components: SIEM, IMS, SOAR, TIP, etc.
Fully Managed SOC Service
Customers have invested in a complete SOC center including full technology but lack of personnel and processes to operate effectively, VSEC provides remote SOC operation
Managed SIEM Service
Administration services for organizations or enterprises owning SIEM platforms such as: IBM QRADAR, Splunk, Log Rhythm, etc. but lacks personnel and processes to operate efficiently.
Security Monitoring Service
Information security monitoring services for security devices, servers, networks, etc. by sending device logs to VSEC’s SOC.
Managed Endpoint Security Service
A service to monitor specified workstations by installing EDR (Endpoint Detection and Response) and remote monitoring by VSEC’s SOC
External Threat Protection Service
VSEC SOC performs monitoring and warning about events related to customer data such as customer data, Brand, VIP/Executive, source-code, etc. on the Internet such as Deep Web, Dark Web, Social Network, Code Repositories, etc.

BENEFITS

24/7 monitoring and real-time incident alert, quick response to information security incidents

Raise the ability to recognize information security incidents, forecast information security incidents

Damage Mitigation, otimizing management costs and troubleshooting information security incidents

Specialization in information security activities, comply with international information security standards

WHY SHOULD YOU CHOOSE OUR SOC?

OPERATING ACCORDING TO INTERNATIONAL STANDARDS ON SOC SYSTEMS SUCH AS SANS AND SREST

COMPREHENSIVE MONITORING (BASED ON PCI DSS, GDPR, CIS, HIPPA, NIST 800-53, MITRE ATT&CK FRAMEWORK, ETC.)

THE ENTIRE MONITORING AND DATA STORAGE SYSTEM IS LOCATED AT VNG CLOUD

HIGHLY CUSTOMIZABLE, DEPLOYING AND EXPANDING ACCORDING TO ACTUAL NEEDS

24/7 MONITORING BY A TEAM OF PROFESSIONAL SECURITY EXPERTS, PERIODIC REPORTS

PROFESSIONAL INCIDENT MANAGEMENT SYSTEM WITH SLA COMMITMENT

CONNECTING WITH THE MONITORING SYSTEM OF THE DEPARTMENT OF SAFETY AND SECURITY, MITER, ETC. AND OTHER INTERNATIONAL ORGANIZATIONS TO UPDATE DATA ON SAFETY AND SECURITY

COUNSELING REQUEST

With nearly 20 years of experience in the security field, we have a team of dedicated and experienced engineers who have performed many security assessment projects for a variety of organizations with different system characteristics. Businesses will always receive the exact problems for their systems and suggestions to improve them.