Security Operation Centre (SOC)

Security Operations Center (SOC) is now an essential part of the protection plan and data protection system that reduces the level of exposure of information systems to both external and internal risks. is now an essential part of the protection plan and data protection system that reduces the level of exposure of information systems to both external and internal risks.

SPEAK TO AN EXPERT

You can't protect, what you can't see

Rabbon’s SOCaaS, Firehawk, provides Organisations and MSPs with access to a network of security analysts at a fraction of the cost of in-house teams. Firehawk enables MSPs to build out dedicated security teams without significant upfront costs. 

Our SOCaaS provides MSPs with threat monitoring, notifications, reporting and analysis capabilities. It enables MSPs to expand their security portfolios, and ultimately, become MSSPs. 

Our SOCaaS enables your organisation to monitor and alert on custom-defined use cases defined for your infrastructure.

In the framework of monitoring the Information System (IS) of a client, the SOCaaS has a central role with 4 objectives:  

  • Ensure the monitoring and detection of security incidents on the IS,
  • Alert the clients of any security incident involving the iris, 
  • Conduct prevention through a monitoring system,
  • Provide assistance to solve incidents.
SPEAK TO A SECURITY EXPERT

TIER 1

This is our base level SOCaaS. Tier 1 customers can forward their logs to our platform. At this level, our security analysts are involved only to onboard our customers and for monthly reporting.
$1200/mo

TIER 2

Tier 2 services includes all Tier 1 service plus use case definition.
Custom Price

TIER 3

Tier 3 services include all services in Tier 1 and 2 plus threat hunting capabilities, tailored use cases to protect critical assets.
Custom Price

TIER 4

This is our highest level of SOCaaS. This service includes all services in Tier 1, 2, and 3 plus 24/7 monitoring of your infrastructure and services from our Crisis Incident Response Team. You will be able to leverage from our incident response playbooks to manage security incidents.
Custom Price

Rabbon's Delivery Process

Our team help you identify critical assets to be monitored in SOC. Contact our GRC team for a comprehensive BIA. This phase is valid for all tiers of SOC services. 

Based on criticality and sensitivity defined in BIA our team will develop use cases to define alerts. For Tier 1 and Tier 2 Service customer, our solution is equipped with predefined use cases. Therefore, onboarding can be performed quickly. For Tier 3 and Tier 4 customers, our security analysts will engage with your IT team to define tailored use cases to fine-tune alerting.

Our team will collaborate with your IT teams to forwards logs to our solution so that we can start monitoring and alerting. This phase is valid for all tiers of SOC services. 

For our Tier 3 and Tier 4 customers, our security analyst will define detection rules to correlate the logs to detect anomalies. 

For tier 4 customers, our security analyst will perform threat hunting using our advanced threat intelligent SOC to ensure we are continuously working to identify threats to your organisation.

Our SOCaaS platform, Firehawk, can define complex user-defined dashboards that can help our security analyst to identify threats and risks are real-time. Our security analyst will deliver a monthly report to all stakeholder to ensure that baseline security is maintained at all times. 

In the event of Security Incident and Data Breach

When the unexpected happens, you need a team with broad expertise and technical skills to help you to minimise impact and bounce back. That means acting quickly to control the situation, understand the full extent of the incident and respond with confidence. 

Our Crisis Incident Response Team can assist to build a resilient cyber security strategy. In the event of security incidents, our team can help you fight the attack, by containing the threat and reducing the attack surface. Our team will perform a post-incident analysis to find the nature of the attack and develop improvement strategies. 

EXPLORE FIREHAWK

SPEAK TO A SECURITY CONSULTANT

Protect your organisation from rising unseen cyber threats.
LET'S TALK