Security monitoring

​​​​​​​Security Monitoring

The Cyber Defense Center monitors and resolves cyber security incidents in real time, seven days a week. Our analysts are able to differentiate security incidents from false alarms, respond to security incidents and propose modifications to detection mechanisms.​

 


Our story

The AEC Cyber Defense Center (AEC CDC) monitors and resolves cyber security incidents in real time, seven days a week. Our analysts are able to differentiate security incidents from false alarms, respond to security incidents and propose modifications to detection mechanisms. We handle each client on an individual basis and adapt our service to meet their particular needs and requirements.

Our solution

Our service primarily consists of cyber security incident management, which involves: ​

  • ​​​the collection, normalization, categorization and correlation of information from individual assets (log sources) in a single place. 
  • analysis and assessment of security incidents to determine whether they are breaches or false alarms. 
  • investigation aimed at determining the vector of the attack and impact and providing additional information necessary to determine an appropriate response. 
  • response and cooperation during response, including intervention by the CSIRT team at the incident site.
  • post-incident activity, record keeping and recommendations to further develop cyber security.
  • monitoring of the availability of monitored assets (log sources). 

The security monitoring service includes support from our central Service Desk where security incidents are reported. The service also includes weekly overview reports on security incidents and vulnerabilities that have been detected even outside of the infrastructure being monitored. 

We offer our security monitoring services in the following regimes: 

  • Monitoring during working hours (8/5). 
  • Continuous monitoring (24/7).
  • Hybrid regime (monitoring during working hours along with 24/7 monitoring of critical incidents). ​​


Why choose AEC? 

  • ​​We are a team of experienced consultants and architects. 
  • We know how to integrate broad portfolios of technologies into a single point and set up processes over these technologies to ensure the correct functionality of the proposed solution. 
  • The solutions we propose are in compliance with national legislation and international standards. 
  • We test the functionality of proposed solutions with penetration tests. 
  • We are a local company with a core group of employees that handles each client on an individual basis. 
  • We have 30 years of experience in the field of information security across many sectors (banks, energy and utilities, telecommunications, manufacturing companies, media and trade, insurance companies, public sector). ​

References

We have long-term partnerships with many companies and organizations across the entire market. Out clients include multi-national companies as well as small businesses and entrepreneurs. We cater to everyone as much as possible and provide custom services with respect to size and area of operation. We will be happy to provide specific references on request. ​

Contact us


Check: 

​​