NTEC Cyber ​​Security Center Services

Monitoring of Customer Information infrastructure Objects Using SIEM

  • Collection and analysis of information security events, with subsequent identification of cyber incidents and notification of their presence. The Cyber Security Center provides this service both on the basis of its equipment and on the customer’s equipment

Monitoring of Customer Information infrastructure Objects Using SIEM

  • Collection and analysis of information security events, with subsequent identification of cyber incidents and notification of their presence. The Cyber Security Center provides this service both on the basis of its equipment and on the customer’s equipment

Responding to Cyber Incidents of Customer Information Infrastructure Objects

  • Detection of customer information security incidents and notification
  • Providing the customer with recommendations for identifying and localizing information security incidents

Responding to Cyber Incidents of Customer Information Infrastructure Objects

  • Detection of customer information security incidents and notification
  • Providing the customer with recommendations for identifying and localizing information security incidents

Orchestration with SOAR System

  • The orchestration of the various SIEMs is accomplished through integration into SOAR, a unified response system

Orchestration with SOAR System

  • The orchestration of the various SIEMs is accomplished through integration into SOAR, a unified response system

SIEM Implementation and Support

  • Provision (sale) of SIEM and its technical support without monitoring

SIEM Implementation and Support

  • Provision (sale) of SIEM and its technical support without monitoring

Customer Cyber Incident Handling

  • Analyzing and documenting identified information security incidents
  • Providing the customer with a report on the causes of incidents and recommendations to prevent their recurrence

Customer Cyber Incident Handling

  • Analyzing and documenting identified information security incidents
  • Providing the customer with a report on the causes of incidents and recommendations to prevent their recurrence

Malware Parsing

  • Static analysis and dynamic analysis of external software
  • Preparing a report with compromise identifiers (IoC)

Malware Parsing

  • Static analysis and dynamic analysis of external software
  • Preparing a report with compromise identifiers (IoC)

Monitoring of Customer Information infrastructure Objects Using SIEM

  • Collection and analysis of information security events, with subsequent identification of cyber incidents and notification of their presence. The Cyber Security Center provides this service both on the basis of its equipment and on the customer’s equipment

Monitoring of Customer Information infrastructure Objects Using SIEM

  • Collection and analysis of information security events, with subsequent identification of cyber incidents and notification of their presence. The Cyber Security Center provides this service both on the basis of its equipment and on the customer’s equipment

Responding to Cyber Incidents of Customer Information Infrastructure Objects

  • Detection of customer information security incidents and notification
  • Providing the customer with recommendations for identifying and localizing information security incidents

Responding to Cyber Incidents of Customer Information Infrastructure Objects

  • Detection of customer information security incidents and notification
  • Providing the customer with recommendations for identifying and localizing information security incidents

Orchestration with SOAR System

  • The orchestration of the various SIEMs is accomplished through integration into SOAR, a unified response system

Orchestration with SOAR System

  • The orchestration of the various SIEMs is accomplished through integration into SOAR, a unified response system

SIEM Implementation and Support

  • Provision (sale) of SIEM and its technical support without monitoring

SIEM Implementation and Support

  • Provision (sale) of SIEM and its technical support without monitoring

Customer Cyber Incident Handling

  • Analyzing and documenting identified information security incidents
  • Providing the customer with a report on the causes of incidents and recommendations to prevent their recurrence

Customer Cyber Incident Handling

  • Analyzing and documenting identified information security incidents
  • Providing the customer with a report on the causes of incidents and recommendations to prevent their recurrence

Malware Parsing

  • Static analysis and dynamic analysis of external software
  • Preparing a report with compromise identifiers (IoC)

Malware Parsing

  • Static analysis and dynamic analysis of external software
  • Preparing a report with compromise identifiers (IoC)

Contact Us

For Conclusion and Maintenance of Contracts:

Contact Us

For Conclusion and Maintenance of Contracts:

Contact Us

For Conclusion and Maintenance of Contracts:

Contact Us

For Conclusion and Maintenance of Contracts:

Order a Service

Наличие системного администратора
Наличие подразделения / специалиста ИБ
Наличие документации на ИС, и наименование
Территориальное расположение активов (ИС)

Order a Service

Наличие системного администратора
Наличие подразделения / специалиста ИБ
Наличие документации на ИС, и наименование
Территориальное расположение активов (ИС)