9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2017
Zoom product LOGO_Security Operations Center

Security Operations Center

LOGO_Security Operations Center

Security Operations Center

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitor Database.

An error has occurred.


Security Operation Center - flexible outsourcing IT security service

IT security or Cyber security nowadays is not only one of the functions of IT operations, but the key element important for the entire company’s business. In addition, threats and challenges in this area are becoming more complex and require constant “awareness” and ongoing investment in the form of human and technical resources. Outsourcing IT security service could represent an optimal response to these challenges, reducing business risks while reducing both capital and operational investments.

Why SOC?

A few years ago, security in IT was mostly reduced to firewall and antivirus solutions. This was enough as there was less exposed information, cyber-crime market was underdeveloped, threats were less sophisticated. This is best evidenced by the fact that in the last two years a larger number of different types of malware/virus have been detected than in the previous 10 years combined. Constant changes and new challenges require not only large investments in human and technical resources, but also constant monitoring and adjusting the same. For these reasons, the capital and operating costs of IT security are becoming larger and larger and more difficult to fit into the available budgets.

SOC, as a partial or complete security outsourcing, may represent an optimal, efficient and cost effective approach in response to these challenges.


Dedicated security experts

One of the most important benefits is a dedicated security team of experts. Larger companies may have dedicated teams and expertise in this area, but in this case Saga SOC team may represent an effective supplement to the internal team in areas that internal teams can not cover. SOC’s expert team is working with several companies and is cooperating with many institutions concerning IT security and thus their broad experience may represent a significant advantage.

Lower costs and scalability

Saga SOC offers 24/7 monitoring and mitigation of incidents. Within most companies there is no dedicated SOC, with a team that is able to work in three shifts. While internal approach requires continuous 24/7 monitoring, Saga SOC provides 24/7 monitoring without the need for expansion of internal teams. This approach is also scalable, infrastructure and processes are provided from the start as part of the services, and resources are adapted to the needs and growth without need for additional capital investment.

Awareness and focus

Experience gained in a larger customer data base provides a much wider view than internal resources have. Similar or even the same threats can occur at more customers’ and thus acquired specific experience can be applied for faster and more efficient detection and remediation (repair) thereof. IT and security solutions in companies often represent isolated islands both in terms of technical integration and of jurisdiction of the various teams and individuals. Saga SOC is able to monitor the entire IT system with efficient correlation of events into really recognized incidents, on the basis of which the next steps can be taken.

What Do You Get From Saga SOC?

Basic operating step in increasing the security of the system (and thus reducing the risk in business) is achievement of high level visibility of the entire system. Visibility is the key factor in all stages of a potential attacks/incidents - prevention, detection and response i.e. mitigation. Achieving visibility is not an easy task - it is not merely monitoring of all parts of the system, but filtering, correlation and focusing on true incidents, which is a continuous “search for a needle in a haystack.

Order your it-sa ticket online in our TicketShop. Save your ticket now!


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access to exhibitors or products saved – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.