SlideShare a Scribd company logo
1 of 4
Download to read offline
ITrust has created the ideal arrange-
ment for overseeing the security level of
your IT infrastructure (in accordance
with HDS or equivalent highly-restrictive
standards), through its own SOC.
Thanks to its SOC, ITrust offers you the
possibility of setting-up a centralized log
management system, completely inte-
grated with existing infrastructures.
A high level of effectiveness where
tracking and log integration devices are
concerned is what our clients can
expect.
UNIQUE	POSITIONING:	
§ Managed
§ Market leader
§ Quality / Added-value
§ Scalable / flexible
§ Recognized expertise
§ Among the global leaders of
proactive detection
MANAGED	SOC	BENEFITS:	
§ Expert team at your disposal,
§ Simplified cybersecurity
management,
§ Scalability and integrated updates
§ High reactivity,
§ Cost optimization.
PRIZES	&	LABELS:	
	
	
	
OVERVIEW
The SOC (Security Operating Center) proposed by ITrust aims to supervise the security
level of your organization (or a specific isolated part within your infrastructure). This
enables you to focus on your core activity by entrusting the cybersecurity of your
information system in the hands of IT professionals.
Our SOC achieves real-time supervision and enables:
§ The real-time analysis, storage and activity monitoring on your IS,
§ The real-time installation, operation and administration of your equipment.
This security operating center allows you to perfect your cybersecurity, while also
ensuring the availability of your services,at an optimal cost and in accordance to existing
regulations.
ITrust offers you an ideal customizable security approach in dealing
with cyber-incidents, designed to:
1. Prevent
§ Continuous vulnerability management,
§ Organizational and system audits,
§ Collaborator training on cyber-awareness.
2. Detect
§ Surveillance, detection, alerting and reporting functions,
§ Unknown threat detection.
3. Respond
§ Quick response,
§ 24/7/365 service,
§ Analysis and investigation,
§ Improvement recommendations.
4. Ensure risk control and compliance
§ Legal: CNIL, Bale, SOX, RGS, LPM, HADS, OIV, HIPAA;
§ Health-centered: Personal Or Protected Health Information, RGS, HADS ;
§ Standards : 27001.
”“
SECURITY	OPERATION	CENTER
NEXT-GEN SOC OFFER
The SOC offered by ITrust relies on: innovative PRODUCTS, excellence-driven EXPERTISE & proven PROCESSES.
PRODUCTS
1. IKare
IKare is a vulnerability management solution that enables you to
detect in real-time the vulnerabilities of your IS, web applications,
websites. IKare automates the implementation of security best
practices. This increases your security level by 90%; the tool
reinforces the effectiveness of an antivirus or of a firewall.
SOLUTION	ARCHITECTURE	
2. SIEM
SIEM (Security Information and Event Management) is a solution
that enables you to continuously manage and correlate logs.
Reveelium can be easily combined with an existing SIEM, going
beyond the simple analysis of logs.
5. Back Office
The Back Office of ITrust includes all support, monitoring
& administrative activities. Our back office helps you
achieve a refined security management, providing you
with ticketing, workflow, alerting and Darknet monitoring.
3. Reveelium
Reveelium is a behavior analysis solution, among the global
leaders in its field, that enables you to detect viruses, APTs
(advanced persistent threats) and other unknown threats.
Reveelium was developed in order to provide organizations with
an expert anomaly detection system. This system is based on
intelligent algorithms, developed by ITrust over the last 7 years,
with the support of 3 international laboratories.
4. Dashboard
Our automated customizable dashboard summarizes in real-time
field information, with the help of IKare Monitoring, and allows you
to cross-check the assets, vulnerabilities and threats within your
organization, with the aim of establishing your risk level day after
day.
Back Office
Ticketing
Workflow
Alerting
Darknet Monitoring
3. Reveelium
Anomaly Detection,
Weak Signal Analysis:
§ APT, virus and unknown attacks detection,
§ Abnormal behavior discovery within your IS,
§ Data loss or data extraction avoidance,
§ Prevention of IT resources depletion,
§ Automatic alerts,
§ Recommendations,
§ Correction plan.
Managed:
§ Analysis issued by an expert engineer,
§ Service intervention in chip-mode if necessary.
SOLUTION	ARCHITECTURE	
4. Dashboard
Risk Management,
in Accordance with a System of Reference:
§ Security policy implementation and follow-up,
§ Vulnerability and threat inventory,
§ Auditing for policy compliance,
§ Assistance in achieving full compliance.
Managed:
§ Analysis issued by an expert engineer,
§ Service intervention in chip-mode if necessary.
1. IKare
Vulnerability Monitoring:
§ Continuous vulnerability discovery,
§ Trending,
§ Automatic alerts,
§ Security monitoring,
§ Potential risk areas detection,
§ Recommendations,
§ App security,
§ Detailed inventory of critical and non-critical vulnerabilities,
§ Critical vulnerability correction plan.
Managed:
§ Alert and vulnerability study conducted manually,
§ Analysis issued by an expert engineer,
§ Operating team available for contact,
§ Crisis management follow-up
§ Escalation of non-processed critical alerts,
§ Service intervention in chip-mode* if necessary.
*Depending on the service ticket opted for,
you may benefit of a certain number of service chips.
2. SIEM
Log Correlation:
§ Intelligent log correlation,
§ Automated analysis consolidation,
§ Security events and log data archive,
§ Real-time anomaly alerting (before they can impact the
network),
§ Accelerated launch of security investigations,
§ Intrusion detection,
§ Simplified compliance with official regulations,
§ 7-year legal data archive (optional).
Managed:
§ Analysis issued by an expert engineer
§ Operating team available for contact,
§ Escalation of non-processed critical alerts,
§ Service intervention in chip-mode if necessary.
5. Back Office
§ Ticketing
§ Workflow
§ Alerting
§ Darknet Monitoring
PROCESSES
DELIVERY MODELS
Our SOC can be delivered:
On Premise (on-site)
In SaaS mode (on demand)
Managed (MSSP) by ITrust teams
EXPERTISE
Our SOC team is comprised of highly-qualified experts. These professionals define and implement processes and procedures, with
the aim of preparing you for the potential threats to your information system and achieving security risk mitigation.
CONTACT	
Address: ITrust, 55 avenue l’Occitane Email: sales@itrust.fr
31670 Labège Cedex, France Tel.: +33 (0)567.346.780
Site: HYPERLINK "http://www.itrust.fr/en" http://www.itrust.fr/enwww.itrust.fr
DETAILED	FEATURES	
1. Red Team
§ Vulnerability analysis,
§ Intrusive audit,
§ Code audit,
§ Configuration audit,
§ Darknet analysis,
§ Malware and attack analysis,
§ Reverse Engineering,
2. Blue Team
§ Securing assets,
§ Investigation,
§ Incident analysis,
§ Incident response,
§ Perimeter protection,
§ Security awareness,
§ Security architecture,
§ PRA PCA.
4. Communication
& Legal
In relation with institutional, state
and legal actors, ANSSI…
3. R&D Team
§ Maintenance and updates,
§ Customized development.
Client references:
– Paris – San Francisco – New York – Frankfurt –

More Related Content

What's hot

KnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
KnightSentry 2.0 One Pager: Proprietary Security System Health MonitoringKnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
KnightSentry 2.0 One Pager: Proprietary Security System Health MonitoringKnight Security Systems
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
What is Security Operations Centre? Types, Need and Benefits of SOC
What is Security Operations Centre? Types, Need and Benefits of SOCWhat is Security Operations Centre? Types, Need and Benefits of SOC
What is Security Operations Centre? Types, Need and Benefits of SOCPatten John
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations centerCyberhat
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Resilient Systems
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinAnton Chuvakin
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesAtif Ghauri
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?Priyanka Aash
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
Westjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It RightWestjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It RightPriyanka Aash
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]akquinet enterprise solutions GmbH
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DevicePriyanka Aash
 

What's hot (20)

KnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
KnightSentry 2.0 One Pager: Proprietary Security System Health MonitoringKnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
KnightSentry 2.0 One Pager: Proprietary Security System Health Monitoring
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
What is Security Operations Centre? Types, Need and Benefits of SOC
What is Security Operations Centre? Types, Need and Benefits of SOCWhat is Security Operations Centre? Types, Need and Benefits of SOC
What is Security Operations Centre? Types, Need and Benefits of SOC
 
The real cost of a cheap security operations center
The real cost of a cheap security operations centerThe real cost of a cheap security operations center
The real cost of a cheap security operations center
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
Industrial Control Systems 101 - Why Hack The Network If You Can Shut Down Th...
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Westjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It RightWestjets Security Architecture Made Simple We Finally Got It Right
Westjets Security Architecture Made Simple We Finally Got It Right
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
How Linde identifies and tracks security incidents in its SAP systems. [Webinar]
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical DeviceWireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
 

Similar to ITrust Security Operating Center (SOC) - Datasheet EN

TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...akquinet enterprise solutions GmbH
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor jhulsey
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Servicejhulsey
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBMerlin Govender
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...gemmarie1
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
https://spotintelligence.com
https://spotintelligence.comhttps://spotintelligence.com
https://spotintelligence.comNeriVanOtten1
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCEAlex Himmelberg
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 

Similar to ITrust Security Operating Center (SOC) - Datasheet EN (20)

SOC OEM - Datasheet EN
SOC OEM - Datasheet ENSOC OEM - Datasheet EN
SOC OEM - Datasheet EN
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...Effective Cyber Security – the difference between “point in time” and “period...
Effective Cyber Security – the difference between “point in time” and “period...
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
https://spotintelligence.com
https://spotintelligence.comhttps://spotintelligence.com
https://spotintelligence.com
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 

More from ITrust - Cybersecurity as a Service

L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéITrust - Cybersecurity as a Service
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéITrust - Cybersecurity as a Service
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersITrust - Cybersecurity as a Service
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesITrust - Cybersecurity as a Service
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...ITrust - Cybersecurity as a Service
 

More from ITrust - Cybersecurity as a Service (20)

IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
Petya, pire que WannaCry ?
Petya, pire que WannaCry ?Petya, pire que WannaCry ?
Petya, pire que WannaCry ?
 
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécuritéL’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
L’Intelligence Artificielle : un ‘booster’ pour la cybersécurité
 
Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17Manifeste ResistanceCYBER 29.05.17
Manifeste ResistanceCYBER 29.05.17
 
Advanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalitéAdvanced persistent threats, entre mythe et réalité
Advanced persistent threats, entre mythe et réalité
 
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécuritéQuand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
Quand les cybercriminels n’ont plus besoin de fuir les logiciels de sécurité
 
Artificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changersArtificial intelligence and machine learning: ultimate game changers
Artificial intelligence and machine learning: ultimate game changers
 
Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17Manifeste ResistanceCYBER 19.05.17
Manifeste ResistanceCYBER 19.05.17
 
Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17Manifeste ResistanceCYBER 18.05.17
Manifeste ResistanceCYBER 18.05.17
 
Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17Manifeste ResistanceCYBER 17.05.17
Manifeste ResistanceCYBER 17.05.17
 
Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17Manifeste ResistanceCYBER 15.05.17
Manifeste ResistanceCYBER 15.05.17
 
Passer de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menacesPasser de la détection d’anomalies à la détection de menaces
Passer de la détection d’anomalies à la détection de menaces
 
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
Meet anomaly detection: a powerful cybersecurity defense mechanism when its w...
 
L’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en AngleterreL’étrange histoire d’un piratage en Angleterre
L’étrange histoire d’un piratage en Angleterre
 
Ignorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDBIgnorance is bliss, but not for MongoDB
Ignorance is bliss, but not for MongoDB
 
Cisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magicCisco WebEx vulnerability: it’s a kind of magic
Cisco WebEx vulnerability: it’s a kind of magic
 
ITrust Company Overview FR
ITrust Company Overview FRITrust Company Overview FR
ITrust Company Overview FR
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
SOC OEM - Datasheet FR
SOC OEM - Datasheet FRSOC OEM - Datasheet FR
SOC OEM - Datasheet FR
 
Reveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FRReveelium Technical Overview - Datasheet FR
Reveelium Technical Overview - Datasheet FR
 

Recently uploaded

💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...Sheetaleventcompany
 
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...apshanarani255
 
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127kushalpasi01
 
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEAGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEayushi9330
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipNitya salvi
 
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Servicenishacall1
 
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...aakahthapa70
 
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...Sheetaleventcompany
 
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRL
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRLVidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRL
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRLkantirani197
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...Cara Menggugurkan Kandungan 087776558899
 
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book nowUnnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book nowapshanarani255
 
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowAgra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowapshanarani255
 
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...Apsara Of India
 
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfCall Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfsoniya singh
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...rajbaburaj201
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Ifra Zohaib
 
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Monika Rani
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...Monika Rani
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...Sheetaleventcompany
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...deepak38245
 

Recently uploaded (20)

💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
 
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
 
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
Vadodara Low price CASH PAYMENT Hot Sexy genuine college girl 8340694127
 
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEAGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for FriendshipBudaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
Budaun Call Girl WhatsApp Chat: 📞 8617370543 | Girls Number for Friendship
 
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
 
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...
Call Girls In {The Suryaa New Delhi} Call Us !! [ 9667938988 ] Escort Sevice ...
 
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
Chandigarh Call Girls ☎ 08868886958✅ Just Genuine Call Call Girls Chandigarh ...
 
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRL
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRLVidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRL
Vidisha ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Vidisha ESCORT SERVICE❤CALL GIRL
 
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
💊💊 OBAT PENGGUGUR KANDUNGAN JAMBI 08776558899 ATAU CARA GUGURKAN JANIN KLINIK...
 
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book nowUnnao 💋  Call Girl 97487*63073 Call Girls in unnao Escort service book now
Unnao 💋 Call Girl 97487*63073 Call Girls in unnao Escort service book now
 
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowAgra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
 
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...
Udaipur Call Girls ☎ 9602870969✅ Just Genuine Call Girl in Udaipur Escort Ser...
 
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdfCall Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
Call Now ☎8264348440|| Call Girls in Mehrauli Escort Service Delhi N.C.R..pdf
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
Call Girls Nagpur 💋Just Call WhatsApp 7870993772 Top Class Call Girl Service ...
 
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...Call Girls Pune Call  WhatsApp 7870993772 Top Class Call Girl Service Availab...
Call Girls Pune Call WhatsApp 7870993772 Top Class Call Girl Service Availab...
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
 

ITrust Security Operating Center (SOC) - Datasheet EN

  • 1. ITrust has created the ideal arrange- ment for overseeing the security level of your IT infrastructure (in accordance with HDS or equivalent highly-restrictive standards), through its own SOC. Thanks to its SOC, ITrust offers you the possibility of setting-up a centralized log management system, completely inte- grated with existing infrastructures. A high level of effectiveness where tracking and log integration devices are concerned is what our clients can expect. UNIQUE POSITIONING: § Managed § Market leader § Quality / Added-value § Scalable / flexible § Recognized expertise § Among the global leaders of proactive detection MANAGED SOC BENEFITS: § Expert team at your disposal, § Simplified cybersecurity management, § Scalability and integrated updates § High reactivity, § Cost optimization. PRIZES & LABELS: OVERVIEW The SOC (Security Operating Center) proposed by ITrust aims to supervise the security level of your organization (or a specific isolated part within your infrastructure). This enables you to focus on your core activity by entrusting the cybersecurity of your information system in the hands of IT professionals. Our SOC achieves real-time supervision and enables: § The real-time analysis, storage and activity monitoring on your IS, § The real-time installation, operation and administration of your equipment. This security operating center allows you to perfect your cybersecurity, while also ensuring the availability of your services,at an optimal cost and in accordance to existing regulations. ITrust offers you an ideal customizable security approach in dealing with cyber-incidents, designed to: 1. Prevent § Continuous vulnerability management, § Organizational and system audits, § Collaborator training on cyber-awareness. 2. Detect § Surveillance, detection, alerting and reporting functions, § Unknown threat detection. 3. Respond § Quick response, § 24/7/365 service, § Analysis and investigation, § Improvement recommendations. 4. Ensure risk control and compliance § Legal: CNIL, Bale, SOX, RGS, LPM, HADS, OIV, HIPAA; § Health-centered: Personal Or Protected Health Information, RGS, HADS ; § Standards : 27001. ”“ SECURITY OPERATION CENTER
  • 2. NEXT-GEN SOC OFFER The SOC offered by ITrust relies on: innovative PRODUCTS, excellence-driven EXPERTISE & proven PROCESSES. PRODUCTS 1. IKare IKare is a vulnerability management solution that enables you to detect in real-time the vulnerabilities of your IS, web applications, websites. IKare automates the implementation of security best practices. This increases your security level by 90%; the tool reinforces the effectiveness of an antivirus or of a firewall. SOLUTION ARCHITECTURE 2. SIEM SIEM (Security Information and Event Management) is a solution that enables you to continuously manage and correlate logs. Reveelium can be easily combined with an existing SIEM, going beyond the simple analysis of logs. 5. Back Office The Back Office of ITrust includes all support, monitoring & administrative activities. Our back office helps you achieve a refined security management, providing you with ticketing, workflow, alerting and Darknet monitoring. 3. Reveelium Reveelium is a behavior analysis solution, among the global leaders in its field, that enables you to detect viruses, APTs (advanced persistent threats) and other unknown threats. Reveelium was developed in order to provide organizations with an expert anomaly detection system. This system is based on intelligent algorithms, developed by ITrust over the last 7 years, with the support of 3 international laboratories. 4. Dashboard Our automated customizable dashboard summarizes in real-time field information, with the help of IKare Monitoring, and allows you to cross-check the assets, vulnerabilities and threats within your organization, with the aim of establishing your risk level day after day. Back Office Ticketing Workflow Alerting Darknet Monitoring
  • 3. 3. Reveelium Anomaly Detection, Weak Signal Analysis: § APT, virus and unknown attacks detection, § Abnormal behavior discovery within your IS, § Data loss or data extraction avoidance, § Prevention of IT resources depletion, § Automatic alerts, § Recommendations, § Correction plan. Managed: § Analysis issued by an expert engineer, § Service intervention in chip-mode if necessary. SOLUTION ARCHITECTURE 4. Dashboard Risk Management, in Accordance with a System of Reference: § Security policy implementation and follow-up, § Vulnerability and threat inventory, § Auditing for policy compliance, § Assistance in achieving full compliance. Managed: § Analysis issued by an expert engineer, § Service intervention in chip-mode if necessary. 1. IKare Vulnerability Monitoring: § Continuous vulnerability discovery, § Trending, § Automatic alerts, § Security monitoring, § Potential risk areas detection, § Recommendations, § App security, § Detailed inventory of critical and non-critical vulnerabilities, § Critical vulnerability correction plan. Managed: § Alert and vulnerability study conducted manually, § Analysis issued by an expert engineer, § Operating team available for contact, § Crisis management follow-up § Escalation of non-processed critical alerts, § Service intervention in chip-mode* if necessary. *Depending on the service ticket opted for, you may benefit of a certain number of service chips. 2. SIEM Log Correlation: § Intelligent log correlation, § Automated analysis consolidation, § Security events and log data archive, § Real-time anomaly alerting (before they can impact the network), § Accelerated launch of security investigations, § Intrusion detection, § Simplified compliance with official regulations, § 7-year legal data archive (optional). Managed: § Analysis issued by an expert engineer § Operating team available for contact, § Escalation of non-processed critical alerts, § Service intervention in chip-mode if necessary. 5. Back Office § Ticketing § Workflow § Alerting § Darknet Monitoring
  • 4. PROCESSES DELIVERY MODELS Our SOC can be delivered: On Premise (on-site) In SaaS mode (on demand) Managed (MSSP) by ITrust teams EXPERTISE Our SOC team is comprised of highly-qualified experts. These professionals define and implement processes and procedures, with the aim of preparing you for the potential threats to your information system and achieving security risk mitigation. CONTACT Address: ITrust, 55 avenue l’Occitane Email: sales@itrust.fr 31670 Labège Cedex, France Tel.: +33 (0)567.346.780 Site: HYPERLINK "http://www.itrust.fr/en" http://www.itrust.fr/enwww.itrust.fr DETAILED FEATURES 1. Red Team § Vulnerability analysis, § Intrusive audit, § Code audit, § Configuration audit, § Darknet analysis, § Malware and attack analysis, § Reverse Engineering, 2. Blue Team § Securing assets, § Investigation, § Incident analysis, § Incident response, § Perimeter protection, § Security awareness, § Security architecture, § PRA PCA. 4. Communication & Legal In relation with institutional, state and legal actors, ANSSI… 3. R&D Team § Maintenance and updates, § Customized development. Client references: – Paris – San Francisco – New York – Frankfurt –