ع
,
Amman, JO
Rain
10 C
Security Managed Services
  • STS SOC Monitoring Service

STS Security Information and Event Management (SIEM) technologies and Security Operations Center (SOC) enables real-time analysis of Security events, generated by Network, Hardware, Servers and Applications, such as Firewalls, Intrusion Protection and Detection System (IPDS), Vulnerability scanners, End-point security management systems, database servers, DNS servers, Active Directory servers, etc...

STS S SOC deals with real-time monitoring, correlation of events, notifications, and console views. The basic level of service provides long-term log storage for normalization of event data and pre-defined reports, based on the received events. (Additional storage needs will be quoted and priced based on client requirements).

STS SIEM / SOC service will provide you with a secure, flexible, subscription based SIEM / SOC service that is designed to identify a wide range of security threats.

 

It will deliver your business security monitoring needs by providing:

  • Real-time monitoring and alerting of the security status of your services by sophisticated analysis of events passed through our correlation engine.
  • Support from STS SOC Analysts who are able to monitor, react and contain security events from our 24x7 staffed SOC.
  • Simple pricing model that is based on number of devices to be monitored, and the number of events analyzed.
  • We do the complex setup of common correlation rules and analytics, with the option of customer rules and alerts.
  • Vulnerability Management

STS Vulnerability Management Service provide the customer with the capabilities to identify, classify, prioritizing, remediating and mitigating the vulnerabilities which will lead to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization.

  • Vulnerability Scan

STS' Vulnerability Scanning service leverages leading technology assessment solution to perform highly accurate internal and external scan audits across network devices, servers, web applications, databases and other assets in on-premise and cloud environments.

  • Penetration testing

With STS Penetration testing (pen testing) service, the company will get a real-world look at how attacker could exploit vulnerabilities which will help to identify and address security vulnerabilities that could be exploited by cybercriminals.

  • Firewall Rule Review

Ensure that the firewall configuration and rule set meet business and compliance requirements by verifying that actual configurations and traffic actually flowing through the firewalls matches approved configurations and traffic that is approved to flow through the firewalls,.

  • Managed Firewall

STS MSS provide a "managed firewall service " as a solution for firewall operation, administration, monitoring, and maintenance of firewall infrastructure. STS MSS will help establish, maintain, and modify firewall rules, monitor your network, and provide feedback, reports, and analysis.

  • Incident Response

Incident response services help to prepare for, manage, and recover from data breaches and network attacks.

  • Managed endpoint security service

STS provides full managed endpoint security protection for all your devices using leading technology.

  • Computer Forensic Investigation:

Computer forensics is a digital forensic service that deals with crimes committed across computing devices such as networks, computers, and digital storage media.  It helps to identify gather, preserve, extract, interpret, document and present evidence from computing equipment.

  • Security Assessment

Following international industries standard/frameworks like PCI, ISO, NIST and the best practices, STS security assessment will help the entity to determin how effectively it being assessed (e.g., host, system, network, procedure) meets the security objectives.

 

Why STS MSS :

 

  • People : Skilled and certified security resources
  • Technology : Providing security services utilizing our partnerships with security technology leaders.
  • Processes : Following best practices in all MSSP processes.
  • Compliance: Compliance with local and global cyber security regulations.
  • Visibility: Better visibility and monitoring for your infrastructure, internal and external threats.
  • Log residency: Flexible options for security log residency
Contact-Us
Security Managed Services