Monitor. Detect. Mitigate

For more than 10 years we've done projects from Security Processes assessment to Card Readers and Payment Applications security

Monitor. Detect. Mitigate

For more than 10 years we've done projects from Security Processes assessment to Card Readers and Payment Applications security

4+
Projects Per Client
100+
Total Projects
28 Days
Time to Complete Forensic Investigation
56 Days
Discovery to Notification
60+
Incident Responders
20+
Threat Researchers

CSOC´S MISSION

In today's landscape, merely relying on sophisticated security systems is no longer sufficient to combat cyber threats effectively. Firstly, modern attacks can only be detected through constant monitoring and the correlation of information. Often, every second counts, as the extent of damage directly depends on the speed of detection, the accurate interpretation of events, and the promptness of response. Therefore, proactive protection is essential.


The objectives of the information security monitoring service are:
• Timely detection and response to incidents
• Reduction of potential financial and/or reputational damages

• Cost optimization by outsourcing the incident monitoring

CSOC´S MISSION

In today's landscape, merely relying on sophisticated security systems is no longer sufficient to combat cyber threats effectively. Firstly, modern attacks can only be detected through constant monitoring and the correlation of information. Often, every second counts, as the extent of damage directly depends on the speed of detection, the accurate interpretation of events, and the promptness of response. Therefore, proactive protection is essential.


The objectives of the information security monitoring service are:
• Timely detection and response to incidents
• Reduction of potential financial and/or reputational damages

• Cost optimization by outsourcing the incident monitoring

Identification
of threats
Attack
detection
Support
service 8/5
Dedicated
service team
CSOC´s Services
  • Monitoring and correlating user reports and data feeds to identify cybersecurity incidents;
  • Incident response coordination;
  • Security records management - collection, normalization, and storage of log data of security events;
  • Information about threats and vulnerabilities;
  • Threat assessment;
  • Vulnerability management;
  • Forensic analysis.
CSOC´s Implementation Approach
Start
Start
Formation of a centralized center of competence in the field of information security based on CYBER0:
• Continuous and centralized control of information security risks;
• Reduction of damage caused by information security incidents due to their timely detection and rapid response.

Project Planning
Project Planning
  • Allocate and share resources between CYBER0 and partners.
  • Size SIEM for ArcSight ESM, determine load (SEPS or GB per day), and secure hardware and software.
  • Implement SIEM and SOAR in the data center, establish a monitoring room.
  • Set up correlation rules, multi-tenancy architecture, basic SOC processes, and train 3 CSOC and CSIRT employees.
  • Connect initial customers and ITA infrastructure, perform SOC tests, optimize correlation rules and processes, deploy SOAR as IRP.
  • Expand user base, optimize further, and integrate IT feeds.
  • Fine-tune SOAR, complete SOC processes implementation.
Supplier Selection
Supplier Selection
Main requirements for a SIEM solution:
• Multi-tenancy support (for correlation, dashboards and SOAR)
• Flexible event correlation and alerting configuration
• Capabilities for quick and easy scalability
• Built-in SOAR platform
• The supplier's representative is located in the Republic of Angola
• Free courses from SIEM vendor engineers and analysts
• All technical support will be provided in Kwanzas.
Why Choose CSOC
We are a company of specialists passionate about cybersecurity that applies its expert knowledge, years of experience, and industry-leading assessment tools to identify vulnerabilities within your systems before these undetected issues can be exploited by cybercriminals.We help companies across the world deliver cutting-edge services. Commitment, Transparency, and Professionalism, that's how we present ourselves. We look for clients that value our principles, and that we can build long-lasting relationships
Meet Our Team
  • Dima
    SOC manager
  • Denis
    SOC manager
  • Worker
    SOC analyst
  • Worker
    SOC analyst

Cyber Quotes

  • Mario Oliveira
    Secretary of State for Telecommunications and Information Technologies
    "The Vulnerability of Angolan companies is critical, as many of them do not have trained employees and technicians to identify, classify, analyze and avoid the risks of cyber-attacks"
  • Manuel Nunes Júnior
    Minister of State for Economic Coordination
    "Cybersecurity should not be seen as an issue that can be resolved only by the executive, it is everyone's responsibility as citizens and users of the cyber world and only together can the best solutions be found to foster a culture of cybersecurity in institutions and companies, adopting the best practices by investing in issues relating to digital and physical security, among other actions"
  • Hediantro Wilson Mena
    National Director of Cybersecurity at the Ministry of Telecommunications, Information Technologies and Social Communication (MINTTICS)
    "Public and private companies in Angola registered in the first half of this year (2020) more than a thousand cyber-attacks"
Cyber Quotes
Get Started with CSOC
Our specialists are ready to tailor our security service solutions to fit the needs of your organization.
You agree to our Terms and Conditions