Product Info


Security Operation Center Service

The booming of the Internet has brought more of threats such as hacking, attacks, phishing, detection, computer viruses, worms and spyware. Due to the continuous evolution of technology, hackings are more diversified, and the security incidents are becoming more and more complicated.

When enterprises and organizations are threatened by hacking, they are often unable to detect and response in time. Through security monitoring service, enterprises and organizations can instantly detect the internal and external security threats. By dealing security incidents timely, the damage can be mitigated.
Our team is composed of the members of the former CHT Data Communications Business Group that is evaluated as “Excellence” in Executive Yuan Security Service Provider Review. The monitoring service is an integration of People, Process and Technology. Our team can effectively manage the security products, network equipment, and user equipment in your organization. We monitor for security CIA triad for your systems. We provide real-time monitoring, detection and discovery of security incidents through 24/7 operation.

We collect the logs of operating system and security equipment including Firewalls, Intrusion Prevention Systems, WAF, Anti-virus systems, EDR, Network Detection & Response (NDR), and DLP. By sending them back to our SOC for multi-dimensional correlation analysis, we can monitor if the behaviors are security incidents, early warning or abnormal connection.

If there is a security incident, the customer will be notified by email, text message, etc., and the security incident will be handled in a timely manner. Our intelligent security portal can provide customers with a complete overview of all information about security incidents, and can regularly generate monitoring and analysis statistical reports to help customers grasp the overall state of security protection.
Inquiry

Back to company