Protect – Detect – Respond: The Central View of Your Infrastructure

For a comprehensive overview of your IT’s posture, we include these three components in our security platform; and there are few limits. By supporting the utilized tools of our partners, we integrate log sources of hundreds of products and log types out of the box; therefore, the integration of various systems is easy:

  • Operating systems
  • EDR and NGAV
  • Office 365
  • Microsoft Azure AD
  • Router and switches
  • Firewalls, IDS, IPS, and NGFW
  • Web server and data bases

Our Unique Attributes

Our unique attribute is our hybrid approach, integrating your cloud services like

  • Office 365
  • Microsoft Azure AD
  • router and switches
  • firewalls, IDS, IPS, and NGFW
  • web servers and data bases unique attribute
  • SaaS services
  • identity + access management services

with our managed SIEM. Furthermore, we are not limited to our own security solutions, but can integrate existing concepts and are able to analyze security incidents from there by our experts. If required, we also integrate your KRITIS (critical infrastructure) components from operational technology (OT) using specialized log adapters. Our offer is rounded off by using central cybersecurity frameworks, like MITRE ATT&CK, to enable you and our SOC analysts to directly access information from the security community and make the attackers tactics and techniques available to them.

Individual Service and Pricing

No two organizations have the same requirements; this is the motto for our service, we find the matching model including transparent pricing. Regarding our managed security service, we distinguish between the mode of operation HOW the SIEM is operated and which model you wish for the service.

  • Depending on your needs, we offer our managed service, including a corresponding service level agreement (SLA), in two variants: 24 x 7 or 8 x 5 + optional standby

Contact us!

We’re here for you

"*" indicates required fields

Name*