This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

9 - 11 October 2018 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2018
Zoom product LOGO_Security Event Monitoring and Incident Response

Security Event Monitoring and Incident Response

LOGO_Security Event Monitoring and Incident Response

Security Event Monitoring and Incident Response

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Security Event Monitoring and Security Incident Response services ensure prompt and efficient investigation and response to the hacking, malware, or insider attacks and human mistakes. To mitigate security incidents and attacks, and decrease losses, proper monitoring capabilities should be in place, and a dedicated security response task force team should be engaged.

Main values of the service are:

  • 24x7 real-time control over business protection;
  • Detection, prevention, and mitigation of security incidents;
  • Full compliance with internal and external requirements;
  • Detection of configuration and change management defects;
  • Transparency of users’ and administrators’ actions in IT Systems.

Security Operations Center (SOC) as a service is the most solid and comprehensive approach to security operations for businesses. We can implement SOC in any mode: monitoring, control or operational. Components of the service (SOC functions) include:

  • Security Information and Event Management (SIEM) implementation / administration
  • Security Monitoring Team
  • Incident Response Team
  • Control Team (audits)
  • Operational Team (security infrastructure management)

Our services are based on industry-recognized SIEM systems from IBM, HP, NetIQ, Alien Vault and other vendors. We can implement Distributed and Highly Available SIEM, and build a full-scale SOC. We can build the SOC or any its function at the Customer's site, or provide them as a service remotely. Any existing function at the customer’s site can be used to build a SOC.

Advanced monitoring and operation features offered by Infopulse:

  • Detection and protection from zero-day attacks
  • Extended malware protection
  • User behavior analytics
  • Integration of the platform with third-party threat intelligence
  • Proactive defense by integrating with security systems
  • Built-in vulnerability scanning or integration with third-party appliances
  • Extended Active Directory and File Service monitoring
  • Microsoft Exchange Admin audit
  • Security baseline monitoring

While working on SIEM architecture and implementation, Infopulse conducts the following:

  • Deep analysis of assets before connecting them to SIEM: setup required controls, logging level and risks assessment, agreement of an appropriate type of collection (agent or agentless)
  • Preliminary assessment and optimization of client logging infrastructure
  • Simulation of real attacks and vulnerability exploitation modeling for deep log discovery. As a result, minimum false-positive alerts after implementation
  • Development of custom parsing rules for non-standard or in-house applications
  • Deployment of automated incident handling tools
  • Integration with vulnerability scanners, public reputation, and security tracking services

Critical Infrastructure Protection

LOGO_Critical Infrastructure Protection

Secure Software Development Life Cycle

LOGO_Secure Software Development Life Cycle

Security Assessment

LOGO_Security Assessment

Security Compliance Manager (SCM)

LOGO_Security Compliance Manager (SCM)

You decided to attend the it-sa? Get your tickets at the TicketShop



Chat

Do you have further Questions?

Chat with us.

top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.