Uploaded on May 18, 2021
ESDS Security Operations Center services are wise choice to protect your business from all attacks and respond to threats. https://www.esds.co.in/soc-as-a-service
Security Operations Center Services
ESDS Software Solution Pvt. Ltd.
The Digital Transformation Catalyst
https://www.esds.co.in
Traditional SOC!
DETECT
Gartner defines an SOC as a construct with the following
characteristics:
• A mission, usually focused on threat detection and
response.
• A facility, dedicated to the SOC, either physical or
virtual.
• A team, often operating in around-the-clock shifts to TECHNOLOGY
provide 24/7 coverage. , PEOPLE ,
• A set of processes and workflows that support the PROCESS
SOC’s functions.
• A tool or set of tools to help predict, prevent, detect,
assess and respond to security threats and incidents. RESPOND ANALYZE
https://www.esds.co.in
Modern SOC !
1. Permit quick integration into an enterprise
infrastructure via open architecture.
2. Scalable architecture.
3. Real-time visualization tool.
4. Use scenario- and behavior-based analytics
5. Integrate with and use threat intelligence
services.
6. Use big data architecture to allow storage of
source data in its historical or original form.
7. Enable Elasticsearch capabilities
8. Support SOAR functionality.
9. Provide standard (e.g., ISO27001, PCI DSS,
HIPAA, etc) rule sets that are customizable and
extensible.
10. Efficient processes through Threat Intelligence,
Machine learning and Artificial Intelligence,
11. Highly skilled security staff.
https://www.esds.co.in
Modern SOC !
Advanced
Threat
Detection
Effective
Proactive or Real
Monitoring time
Response
SOC
https://www.esds.co.in
ESDS SOC Model
Traditional Model
Correlation Multiple Hardware/
and Security Agent Incident Appliance/ Software
Monitoring Analytics Dashboards Based Response requirements
Data Alerting Compliance Retention Complex Costly Security
Aggregation Setup Personal https://www.esds.co.in
ESDS SOC Model
ESDS Model (MSSP Cloud Solution)
Threat Intelligence
AI and Machine Learning
User and Entity Behavior Analytics (UEBA)
Real time Threat Hunting & detection
Agentless Solution
Only Server requirement
Out of the box solution
Highly skilled security personals
24x7 running SOC center from Mumbai and
Bangalore
SOC Service from MeiTY empanelled, Tier 3 data
center certifed to major standards like ISO 27001,
PCIDSS etc.
Cost Effective + with all basic solutions as per
traditional model
https://www.esds.co.in
I. ESDS SOC Solutions
Security Incident Monitoring
(Eagle Eye Service)
Data aggregation
Correlation and security monitoring
Analytics
Alerting
Dashboards
Compliance
Log Retention
Incident response
Defining different reports and sending monthly reports
of all security incidents.
Monitoring different events on 24x7x365 basis.
Threat Intelligence
A.I and Machine Learning functionality
User & Entity Behavior Analytics(Optional)
Real time Threat Hunting & detection
Intimating customers about security risk and incidents
and suggesting require actions.
Studying and Reporting anomalies
https://www.esds.co.in
Data
Aggregation Threat Correlation &
Intelligence Security
/Machine Monitoring
Learning
Reporting/ Alerting &
Compliances Incident
Response
SOC Eagle Eye User
Services Behaviour & Event
Analytics
https://www.esds.co.in
Benefits ESDS Cloud SOC Services
Preparing organization for advanced cyber attacks
Low cost factor
• Many companies find it unfeasible to hire in-house cyber security solutions as heavy CAPEX
(Capital Expenditure) is involved in buying Hardware and software.
• Only OPEX (operational expenditure) is required to start.
Expertise cyber security professionals
With SOC-As-Service, companies don’t have to hire in-house cyber security experts to handle
today’s advanced cyber security threats.
Proactive defense management
• Service is offered remotely by a team of experts who work off-site 24x7x365 days
monitoring.
• Proactive threat intelligence data gathering and generating alerts to actively mitigate risks via
Machine Learning and behavior analysis
• Faster incident response time
• Enhanced system and experienced staff for managing security incidents
• Experienced Cloud Service provide having Tier III data center with all major compliance
certified.
• Adhering all major compliances and regulatory guidelines (ISO 27001:2013, NIST, GDPR,
PCIDSS, HIPPA, etc)
• All in one cyber security reports for management https://www.esds.co.in
II. Security Insight Services
Application/ DB
Testing-Assessment
Security Posture Analysis
Email &
Reports & Wireless
Recommendation Assessment
SIEM
Planning
Effectiveness
Deployment Security
Gap Modeling
Techniques Assessment
Analysis
System and
Network
architecture
study
Understanding
roles and
responsibilities SOC Security
Insight Services
https://www.esds.co.in
Security Incident & Threat Analysis
Security Incident & Threat Analysis
Review
Application Application
Security Network Flow Performance system
Devices traffic
Incident & Threat Assessment
Assessment
Monitoring Monitoring,
Analysis
Database Performing logging,
Activity Vulnerability Reporting
Traffic Analysis Assessment Scans
Integration with and Reporting
monitoring
Services
https://www.esds.co.in
Continued…
Add-on Services
DDoS Attack Analysis & Testing Email Security Assessment
Wireless Security Assessment
DLP Analysis & Testing
https://www.esds.co.in
Continued…
Analysing &
Documenting Correlating with Overall
Overall IT Industry Standards Security Recommendations
security gaps for complying
security objectives Assessment
Report
Gap Report and
Analysis Recommendations
https://www.esds.co.in
III. Total Secure Services
Proactive
Remediation of
Security
incidents with
Customer in
All Security features Loop
and deliverables of
Eagle Eye &
Insight services
Periodic client visit of
ESDS Security expert
for verifying security
environment
Onsite availability
of ESDS Security
expert at critical
security issues on
resolution advisory
https://www.esds.co.in
III. Total Secure Services
SOC Total Secure Services
Overall
Proactive Security Security
Remediation/ Incident
Onsite Availability AssessmentsMonitoring
Database/
Addon Services/
UBEA / Threat
Email/ Application
Intelligence/
DLP/Wireless Monitoring
ML
Security
https://www.esds.co.in
Vulnerability Management
• Vulnerability assessment is the process of identifying,
quantifying and prioritizing (or ranking) the
vulnerabilities in Physical and Virtual IT infrastructure.
• Vulnerability assessment includes scanning all network
IP based components like servers, firewalls, etc and web
applications through automated and manual security
tools.
• Integration of all Vulnerabilities results with SIEM
solution
• ESDS VA activities include but not limited techniques
like:
Network Scanning, Port Scanning, Vulnerability
Scanning, Malware Scanning , Spoofing , Scenario
Analysis, Application Security Testing ,OS Fingerprinting,
Service Fingerprinting, Access Control Mapping, Denial of
Service (DOS) Attacks, DDOS Attacks, Authorization
Testing, Lockout Testing, Password Cracking, Cookie
Security, Functional validations
*The above activities are non-standard and cannot be taken as complete
deliverables. Scope will be defined on customer’s requirement on project basis.
https://www.esds.co.in
Benefits
Comprehensive
Testing for Identify potential Secures against Minimize the
Networks security risk to internal business logic Improved likelihood of data
loopholes systems flaws compliance breaches
1 2 3 4 5 6 7 8 9
Validates the Validates the Increased IT Complete security
effectiveness of effectiveness of security posture report
current security security and with
safeguards system updates/ recommendations
upgrades
https://www.esds.co.in
Thank You
https://www.esds.co.in
Comments