1/4

The RTNC SOC is designed to cope with cyber-attacks and protect organizations from severe damages. The Security Operation Center (SOC) is the heart of the information security eco-system providing clear visibility into security vulnerabilities and threats penetrating the organization.

OBJETIVE

ESTABLISHMENT OF CENTRALIZED CYBER SECURITY OPERATIONS.

RTNC - SOC

END-TO-END SOLUTION

Consultancy-Icon-1.png

Consultancy

Comprehensive guidance for establishing correct policies and requirements in accordance with the client’s environment and strategic goals.

OntheJobTRaining-Icon.png

On-the-Job Training

Cooperating the SOC with a combination of client personnel and RTNC-Tech experts until complete implementation is achieved.

ProcessDevelopment-Icon.png

Process & Procedures Development

Tailored to your needs and requirements.

ITNetworkDesign-Icon.png

IT & Network Design and Installation

Complying with the highest standards.

SOCTechnology-Icon.png

Cybersoc Technology

Optimal process automation with easy customization and management platforms.

SocFacility-Icon.png

SOC Facility

Architecture, construction and renovation, interior design and installation.

CapacityBuilding-Icon.png

Capacity Building

Education and Training of dedicated staff to the specific SOC operation.

SupportMaintenance-Icon.png

Support & Maitenance

Maintaining a close and attentive relations with clients to ensure sustainable growth, improvement and satisfaction.

SOC

BUILDING BLOCKS

SOC operators gain comprehensive insights and assistance in decision making for quick response and recovery times.

SOC Technology

  • Powered by state-of-the-art Big Data SIEM Technology

OBJECTIVE

Logistic & Maintenance Rooms

  • Meeting Rooms, Servers Room

  • System Engineering,

  • Commander and Security Monitoring,

  • Logistic & Administration,

  • External Coordination

  • Reception and common areas

OBJECTIVE

Optimal operation, safe infrastructure and convenient environment.

SOC Operations

  • Combination of processes, people and technologies

  • Monitor

  • Detect

  • Remediate

  • Report on security incidents

OBJECTIVE

Protecting critical assets from severe impacts that could pose a threat to businesses, operations and citizenry.

Crisis Room

CyberSOC Main Control Room - Capacity Building

  • Operated by highly trained and qualified cyber professionals:

  • Tier-1 Alert Analysts

  • Tier-2 Incident Management Analysts

  • Tier-3 Threat Hunting and Forensics Experts

  • CyberSOC Management

OBJECTIVE

Trained and qualified SOC professionals providing effective threats detection and quick remediation and recovery from security incidents.

  • Full view of the main control room and video wall

  • Private and secluded

  • Suitable for crisis management

  • Communication platform linked to key entities

OBJECTIVE

Designed to handle crisis situations of grave importance which require special measures other than the regular SOC routine.

OPERATED BY CYBER PROFESSIONALS

Security Analysts

  • Tier 1 – Events Monitoring and Alert

  • Tier 2 – Incidents managers

CERT and threat hunting investigators

  • Tier 3 – Deep Investigations

Cyber Security Managers

  • SOC Managers

  • IT Project Managers

  • CISO

  • CSO

IT Security Engineers

  • Systems Configuration

  • IT Infrastructure design & Installation