Security Testing and Assessment Services


Main features
- X-SOC deploys technology to collect all ATTT logs/events on the customer's monitored IT system, and sends them to the centralized SOC technology platform on the Cloud to perform storage, analysis, detection, warning, management and investigation of incidents.
- X-SOC's ATTT monitoring team performs direct monitoring on the SOC technology platform with standardized processes in compliance with customer regulations.
The IT security monitoring service is provided on the basis of the customer's existing SIEM system, performing the management of the existing SIEM system, with all logs stored on the SIEM system, not sent outside. X-SOC will provide Tier 1, 2, 3 personnel depending on the customer's needs to manage the customer's SIEM system. The scope of work may include: monitoring and coordinating with the customer to handle warnings, optimizing the set of continuous monitoring rules during the monitoring process.
The service provides knowledge data and intelligence data on information security, including 2 main categories:
- External Threat Protection: Collects and monitors data from the Internet, Dark Web, Dark Forum, Social Network, ... to provide warnings about threats to businesses/organizations such as data leaks, targeted attack campaigns, website impersonation activities, ...
- Threat Intelligence Platform: service to share knowledge data and intelligence data on information security according to the requirements of businesses/organizations through integration according to standards such as STIX/TAXII, API with the information security systems of businesses/organizations such as SIEM, SOAR, ...

Solution objectives
X-SOC is a model that provides information security services based on a high-end cloud computing platform. The Security Operations Center will be located on the cloud and connected to the monitoring system (Collector Server) located at the enterprise. Information security monitoring and protection activities will be performed remotely 24/7 by X-SOC experts. All Logs data are packaged and encrypted before being sent to the service provider via a secure transmission channel.
Other services


Connect now to receive the earliest advice from us.

