Aus NetMotion wird Absolute Secure Access
VPN Lösung von Absolute
The Leuchter IT Cyber Security Operations Center expands your IT security department and supports you in meeting your legal responsibilities, documented in a security reporting. The service has been ideally tailored to SMEs, with the aim of providing optimum support in matters of cyber security. The services include:
Customer-specific processes can be monitored individually
24/7 Support (First- und Second-Level-Support)
Timely detection and elimination of malware
Proactive monitoring of your IT infrastructure
Regular security audits
IT security consulting on known security leaks
Monthly security reporting
Leuchter IT Solutions AG operates the SOC in-house around the clock. Your IT infrastructure is continuously monitored, analyzed and evaluated by our IT security experts. Thanks to the knowledge gained during the detection and prevention process, cyber security is improved in the long term. The benefit: cyber threats against your company can be stopped and eliminated even faster in the future.
Benefit from our IT security knowledge and improve your IT security situation in the long term.
Already over 1,500 monitored end devices
Ideal and tailored to SMEs
IT security experts are made available to you
More security for your data
Immediate notification, handling and remediation of security incidents
Comprehensive IT monitoring around the clock
Proactive action on malware and vulnerabilities
Additional IT security experts as needed
The Leuchter IT Cyber Security Audit uses Azure Sentinel technology. It is a cloud-based SIEM (Security Event and Event Management) solution from Microsoft for automated security threat detection, which allows combining activity data from different sources in a common workspace. Artificial intelligence (AI) and machine learning (ML) are used for security analysis.
This supports and helps our cyber specialists to quickly detect and avert attack scenarios.
The Leuchter IT Cyber Security Operations Center offers the option of defining customer- and device-specific rules. This means that individual needs and processes can be addressed to ensure the highest level of security. You also benefit from a default set of over 200 rules
Depending on the rule, these are checked every 15 minutes or at intervals up to daily. The rules are defined and evaluated specifically for the customer. Leuchter IT Cyber Security Operations Center Silver and higher can run advanced queries thanks to Microsoft Sentinel.
Our Leuchter IT Cyber Security Operations Center is based on the four pillars:
The latest technologies and processes are used for proactive monitoring. Algorithms immediately detect and isolate known attack scenarios. Artificial intelligence ensures that suspicious applications and processes are identified and stopped.
As soon as an alarm is triggered, our cyber security team takes over the analysis and immediately initiates all necessary measures to protect your corporate network.
All potential risks to your company are identified and transparently listed through a series of assessments. The residual risk is reduced by introducing structured recurring measures, which are listed below. Fully in line with our motto: Prevention is more effective than reaction.
The service records security events across all relevant data sources, providing comprehensive visibility and transparency. Advanced attack detection, in near real-time, allows security analysts to effectively analyze notifications, prioritize and isolate endpoints centrally, providing visibility into the full scope of an incident to take action to remediate threats.
At this stage, customer-tailored rules also take effect and individually block traffic on the network. Suspicious domains, files, URLs and IP addresses from own analyses and third-party suppliers are blocked immediately by default.
Once an alert is triggered, the SOC manager reviews the alert using a proven and standardized process. Experienced analysts ensure confident decision making and continuous development throughout the detection and analysis process. These include:
In the event of an incident, our IT security analysts initiate immediate defensive measures and isolate the malware. A coordinated approach according to the defined process steps enables a particularly fast response. After successful defense, the incident is handed over to the responsible recovery team. The measures include:
The measures listed above (Prevent, Detect, Investigate, Response) are carried out in all our packages.
The packages differ only according to the scope of services.
Decide for yourself how much cyber security you need for your company. Choose between our SOC packages Bronze, Silver and Gold.
Cyber Security Operations Center
Cyber Security Operations Center
VPN Lösung von Absolute
Ständig hört man in der Presse, dass die IT-Sicherheit von Unternehmen verbessert werden muss – und scheinbar hängt...
Die Anzahl an Cyberattacken auf Unternehmen nimmt weiterhin zu und schlimmer noch: Die Art der Angriffe wird immer...
Das Nationale Zentrum für Cybersicherheit (NCSC) ist das Kompetenzzentrum des Bundes für Cybersicherheit und erste...
presented by: Hochschule Luzern – Informatik Wichtigste Merkpunkte: Definieren Sie regelmässige Zeitfenster...
Am 3. März hat Microsoft offiziell über vier schwerwiegende Lücken in den Exchange Versionen 2013, 2016 und 2019...
Aufgrund einer gravierenden Lücke im Netlogon Protokoll stuft Microsoft den Security Standard für die Netlogon...
VPN (Virtual Private Network) ist aus vielen Netzwerken und Unternehmungen seit Jahren nicht mehr wegzudenken. Das...