SECURITY OPERATION CENTER
Atlantica Digital considers Cyber Security as a process during which it is necessary to take measures at different levels and address security issues with a holistic view.
The holistic approach to system protection, combined with new techniques to combat cyber attacks, exploits the so-called deception techniques (deception) and allows you to stem attacks by unmasking malicious activities and blocking them, exposing “traps” as targets.
This approach is currently the most effective against Ransomware and Fileless attacks, which are today the most widespread in terms of effects and methods.
Atlantica Cyber Security services are provided exclusively remotely in as a service mode and are governed by contracts that indicate the scope of the service, the activities to be performed (monitoring, vulnerability management, incident recovery) and the SLAs to be respected.
Centrally manages analytics, event correlation, incident response, and threat containment and/or eradication response automation across endpoints, servers, and mobile devices
Managed Detection and Response in OT/IoT environments, integrating security events from sensors, measurement, calibration and detection devices within the Atlantica Cyber Security SOC. A security layer is also provided on critical devices, protecting parameter modification or deletion operations at the firmware level
Based on artificial intelligence, it is used for the detection of malicious behavior, the correlation to assets and identities for quick analysis and root causes of an incident.
Comprehensively monitor the entire attack surface, identify patterns, and prevent potential threats at scale
MSSP (Managed Security Service Provider)
Manages the Incident Response chain through the SIEM, or that of the customers, from log management to detection rules, up to event correlation
It provides a fast and complete analysis through automatic tests that allow the identification of a possible attacker
The reference market of Atlantica SOC is that of medium and large companies, TELCOs, Energy & Utilities, Banks, Insurance companies, SMEs, PA.
Atlantica’s SOC is based on ETSI standards, on harmonized ICT security and Incident Management standards, on internationally recognized ISO certifications.
The solution represents, in terms of architecture, platforms, products, performances, configurations, functions and technological choices, the best the market can offer today. Everything is compatible in terms of import automatisms, automatic reporting of incidents, in relation to detection rules, automatic versioning of detection rules, automatic opening of tickets based on certain triggers and reporting of incidents by extrapolating data from the platform.
ADD ON SERVICES
The Early Warning service allows the timely identification of the main IT threats, relating to customer cases, which could have a significant impact on the IT infrastructure and on the business.
The Threat Intelligence service is aimed at collecting, sharing and identifying information relating to threats, strategies and the actors behind the threats themselves. The Info Leak and Data Breach Detection service is mainly aimed at discovering the presence of “Data Leaks” (“data leakage” intentionally made public) containing more or less sensitive information.
Security awareness activities include training and awareness actions that are provided to specialist and non-specialist personnel in the IT sector. Security awareness activities can be carried out through webinars and/or face-to-face seminars.
The service allows you to analyze malware or suspicious files in controlled environments and with the most advanced dynamic and static analysis techniques.
Vulnerability Assessment/Penetration test
Vulnerability Assessment and Penetration Test services are provided, both in synergy with threat monitoring activities, and in stand-alone mode. These activities can be carried out manually or through the use of automated tools that allow you to plan periodic tests over time.
The Forensic service aims to identify, extract, preserve and protect documents for evidentiary purposes without compromising their integrity (chain of custody). Forensic analysis allows the acquisition of information from compromised digital devices following a cyber incident.
Brand Protection/Fraud Management
Through the use of the Brand Protection and Fraud Management service it is possible to identify and possibly counteract the unlawful use of the customer’s brand. Brand reputation monitoring is carried out 24 hours a day through the use of automatic tools, and subsequently, through the analysis carried out by the SOC.