{"id":1549,"date":"2021-05-13T11:30:38","date_gmt":"2021-05-13T04:30:38","guid":{"rendered":"https:\/\/www.gvm-global.com\/th\/?page_id=1549"},"modified":"2021-05-14T17:04:36","modified_gmt":"2021-05-14T10:04:36","slug":"cyber-qilin","status":"publish","type":"page","link":"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/","title":{"rendered":"Managed Security Operation Centre (MSOC)"},"content":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=&#8221;1497&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column]\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t[\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=&#8221;913&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Managed SOC Service designed to be vendor agnostic and flexible to work with any Information Security solutions and are able to adopt client already-invested security infrastructure into our proven security solution and management process in order to deliver true value to our client. We address the full threat landscape from technology security, people, processes, security operations, security strategy and governance.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><b>THE SYMPTOMS\u00a0<\/b><\/h3>\n<ul>\n<li>Security Operation Centers (SOC) don\u2019t appear to be effective for real life offensive actions<\/li>\n<li>Existing organizational Cyber <b>response<\/b> capabilities are not real life experienced and mostly ineffective<\/li>\n<li>Growing number of Help desks functioning as SOCs \u2013 creating a false sense of protection<\/li>\n<li>Huge gaps in monitoring optimization \u2013 between what is being monitored and what should be<\/li>\n<li>A growing lack of <b>professionalism<\/b> in commodity SOCs<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><b>KEY DIFFERENCES<\/b><\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Acts as an extension of the existing cyber defence capabilities. Providing fast and effective growth in cyber defense<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>The only fully \u201cTechnology agnostic\u201d\u00a0 SOC as a service. Operates with any existing or security technologies on site<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Business model was designed for optimal efficiency and practical deliverables, not quantity of work, NO \u201cEVENTS PER SECOND\u201d pricing.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Constantly work to develop new and relevant security tools internally, designed to help us better serve our clients against emerging threats.<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>End to end solutions, offering SIEM and monitoring solutions for clients with no existing SIEM<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<ul>\n<li>Our red teams are constantly active and operational, pushing relevant data and knowledge into our SOC to verify that we stay up to date and in the game<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column]\t\t\t<hr class=\"firwl-spacer-m\">\n\t\t[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h3><b>Cyber Qilin core offering<\/b><\/h3>\n<ul>\n<li>24\/7\/365 Monitoring from our offices in Israel<\/li>\n<li>Incident Response team &#8211; 24\/7\/365 SLA<\/li>\n<li>In-house Tier 1-4 security analysts capabilities<\/li>\n<li>Ongoing threat intelligence feeds<\/li>\n<li>Incident handling runbooks\/flight guides<\/li>\n<li>SIEM Optimization from our unique offensive perspective<\/li>\n<li>Individual system review of all log sources feeding into the SIEM<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_empty_space height=&#8221;45px&#8221;][vc_single_image image=&#8221;1678&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_single_image image=&#8221;1497&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=&#8221;913&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Managed SOC Service designed to be vendor agnostic and flexible to work with any Information Security solutions and are able to adopt client already-invested security infrastructure into our proven security solution and management process in order to deliver true value to our client. We address the ...<\/p>\n","protected":false},"author":2,"featured_media":1497,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-wide.php","meta":{"footnotes":""},"class_list":["post-1549","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Managed Security Operation Centre (MSOC) - GVM-Global<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managed Security Operation Centre (MSOC) - GVM-Global\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_single_image image=&#8221;1497&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row][vc_column][vc_single_image image=&#8221;913&#8243; img_size=&#8221;large&#8221;][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]Managed SOC Service designed to be vendor agnostic and flexible to work with any Information Security solutions and are able to adopt client already-invested security infrastructure into our proven security solution and management process in order to deliver true value to our client. We address the [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/\" \/>\n<meta property=\"og:site_name\" content=\"GVM-Global\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-14T10:04:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gvm-global.com\/th\/wp-content\/uploads\/2019\/05\/Cyber_Qilin_Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gvm-global.com\/th\/#website\",\"url\":\"https:\/\/www.gvm-global.com\/th\/\",\"name\":\"GVM-Global\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.gvm-global.com\/th\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.gvm-global.com\/th\/wp-content\/uploads\/2019\/05\/Cyber_Qilin_Logo.png\",\"contentUrl\":\"https:\/\/www.gvm-global.com\/th\/wp-content\/uploads\/2019\/05\/Cyber_Qilin_Logo.png\",\"width\":2500,\"height\":683},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#webpage\",\"url\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/\",\"name\":\"Managed Security Operation Centre (MSOC) - GVM-Global\",\"isPartOf\":{\"@id\":\"https:\/\/www.gvm-global.com\/th\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#primaryimage\"},\"datePublished\":\"2021-05-13T04:30:38+00:00\",\"dateModified\":\"2021-05-14T10:04:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gvm-global.com\/th\/\",\"url\":\"https:\/\/www.gvm-global.com\/th\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/www.gvm-global.com\/th\/cyber-qilin\/#webpage\"}}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/pages\/1549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/comments?post=1549"}],"version-history":[{"count":23,"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/pages\/1549\/revisions"}],"predecessor-version":[{"id":1712,"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/pages\/1549\/revisions\/1712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/media\/1497"}],"wp:attachment":[{"href":"https:\/\/www.gvm-global.com\/th\/wp-json\/wp\/v2\/media?parent=1549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}