Our SOC service is an adaptable solution that gives your organisation enhanced protection. Organisations are increasingly becoming targets for cyber threat actors to attack and disrupt in a number of ways including stealing data, ransom and to disrupt production.
Our capabilities include the following services:
SOC Design and Build – designing and implementing a security operating centre, including the testing and configurations of tools as well as the transition of security monitoring tools.
Protective Monitoring – log collection, aggregation and correlation by our SOC team.
Intrusion Monitoring – detecting intrusions, performing security analysis with our SOC team and arming prevention systems.
Malware Monitoring – detecting malware, analysing devices and conducting security analysis with our SOC team.
Vulnerability Monitoring – detecting vulnerable customer systems, including vulnerability scanning and regular reporting by a Service Delivery Manager.
APT Monitoring – detecting of advanced persistent threats (APT) in customer systems, including device management and security analysis by our SOC team.
- 24/7 Helpdesk
- ISO27001 security standard accredited organisation
- Products Support- Technical Telephone Support/Engineer to Site Support
- Repair/Replacement Program
Solution for quick detection and investigation
Keelback Net provides advanced detection and in-depth investigation of sophisticated cyber intrusions, using network sensors deployed within customers’ networks (Keelback Sensor) and our dedicated analytics platform (Keelback Analytics).
Our sensor uses an Intrusion Detection System (IDS) engine with a metadata analysis via Deep Packet Inspection (DPI), resulting in refined detection and less false-positives. Whereas our analytics solution is constantly monitoring data traffic and will raise the alarm if an intrusion is detected.
A mass forensic solution which operates on either part or the totality of your IT system. This solution is using comparative analysis to determine either the likelihood or the presence of an ongoing sophisticated attack.
Our team is able to detect 0 days, deviations or targeted attacks by using a dedicated comparative analysis tool and keeps total control of the collected metadata.
To be a solution that fit any customer, a dedicated non-resident agent is generated for you according to your specific needs and constraints.
Each list of collected metadata and storage locations are agreed with you prior to agent generation.
As we care about data protection, Keelback Host is designed to collect only relevant metadata for forensic analysis on the targeted machines: no files will be collected; mass forensic analysis is performed by Airbus CyberSecurity experts on dedicated laptops in restricted access forensic lab or on customer premises.
Detect and qualify advanced threats
Orion Malware is designed to detect sophisticated malwares in your network by combining the performance of Static analysis, Sandboxing and Machine learning.
Through its unique interface, Orion Malware provides SOC, CTI and Incident Response teams with advanced capabilities for qualifying emerging threats, investigating and responding through a tailor-made approach.
Orion Malware benefits from our latest threat intelligence materials so you always get the best of breed detection capabilities and latest contextual information about APT, malwares and ransomwares relying for instance on zero-day or advanced obfuscation technics.