It correlates the logs generated by security controls such as Firewall, NAC, Antivirus, ERP, Post Office, servers, end user devices and others that the organization has implemented in order to prevent, detect and respond to cyber attacks against it.
SOC Service Features
-Monitoring security devices.
-Correlation of alerts from security devices.
-Validation of incidents and notification.
-Support in security incident management.
-Automated processing of alerts.
-Supervision by a security operations center with people.
-Collection and storage of log data.
-Log analysis.
-Creation of remediation and execution guides.
-Use of machine learning techniques to detect threats.
-Improved and prioritized alerts with business context.
-Development of use cases.
-Study of the performance of new correlation rules.