
The RTNC SOC is designed to cope with cyber-attacks and protect organizations from severe damages. The Security Operation Center (SOC) is the heart of the information security eco-system providing clear visibility into security vulnerabilities and threats penetrating the organization.
OBJETIVE
ESTABLISHMENT OF CENTRALIZED CYBER SECURITY OPERATIONS.
RTNC - SOC
END-TO-END SOLUTION

Consultancy
Comprehensive guidance for establishing correct policies and requirements in accordance with the client’s environment and strategic goals.

On-the-Job Training
Cooperating the SOC with a combination of client personnel and RTNC-Tech experts until complete implementation is achieved.

Process & Procedures Development
Tailored to your needs and requirements.

IT & Network Design and Installation
Complying with the highest standards.

Cybersoc Technology
Optimal process automation with easy customization and management platforms.

SOC Facility
Architecture, construction and renovation, interior design and installation.

Capacity Building
Education and Training of dedicated staff to the specific SOC operation.

Support & Maitenance
Maintaining a close and attentive relations with clients to ensure sustainable growth, improvement and satisfaction.
SOC
BUILDING BLOCKS
SOC operators gain comprehensive insights and assistance in decision making for quick response and recovery times.
SOC Technology
-
Powered by state-of-the-art Big Data SIEM Technology
OBJECTIVE
Logistic & Maintenance Rooms
-
Meeting Rooms, Servers Room
-
System Engineering,
-
Commander and Security Monitoring,
-
Logistic & Administration,
-
External Coordination
-
Reception and common areas
OBJECTIVE
Optimal operation, safe infrastructure and convenient environment.
SOC Operations
-
Combination of processes, people and technologies
-
Monitor
-
Detect
-
Remediate
-
Report on security incidents
OBJECTIVE
Protecting critical assets from severe impacts that could pose a threat to businesses, operations and citizenry.
Crisis Room
CyberSOC Main Control Room - Capacity Building
-
Operated by highly trained and qualified cyber professionals:
-
Tier-1 Alert Analysts
-
Tier-2 Incident Management Analysts
-
Tier-3 Threat Hunting and Forensics Experts
-
CyberSOC Management
OBJECTIVE
Trained and qualified SOC professionals providing effective threats detection and quick remediation and recovery from security incidents.
-
Full view of the main control room and video wall
-
Private and secluded
-
Suitable for crisis management
-
Communication platform linked to key entities
OBJECTIVE
Designed to handle crisis situations of grave importance which require special measures other than the regular SOC routine.
OPERATED BY CYBER PROFESSIONALS
Security Analysts
-
Tier 1 – Events Monitoring and Alert
-
Tier 2 – Incidents managers
CERT and threat hunting investigators
-
Tier 3 – Deep Investigations
Cyber Security Managers
-
SOC Managers
-
IT Project Managers
-
CISO
-
CSO
IT Security Engineers
-
Systems Configuration
-
IT Infrastructure design & Installation