The objective is to help organizations developing their cyber vigilance capability by advising, implementing and operating a managed SOC, on-premises or on the cloud, with use cases that fit each business, logs fine-tuning and a proved threat intelligence and exchange capability.
One of the SOC main objectives is to have a holistic view of the client’s environment. BMB SOC approach is to detect both internal and external threats targeting our client by first understanding the organization, crown jewels, threats, internet presence, etc. and then ensuring all detection mechanisms are well enhanced, implemented and maintained.
We assist in responding to cyber security incidents by ensuring the required measures in stopping the bleeding and isolating the infected systems and proceeding with the required identification and forensics associated with the incident.
Having a proactive approach in order to consistently identify internal and external vulnerabilities present within the infrastructure and provide the required recommendations in order to remediate them accordingly.
The cyber threat intelligence is provided via our tool Darkivore that scrapes deep & dark web onions & hunts leaked info in the cyberspace, identifies threats and prevents attacks. Darkivore is a powerful tool for keeping your company’s info safe & your digital footprint monitored.
This service aims to assist the clients by providing on-demand specialists to execute configuration hardening and manage different systems within the infrastructure and ensure a secure and protected network.
The objective of this exercise is to assist the organization in both developing and enhancing an internal security operation center by focusing on the 3 pillars people, process and technology.
Having a 24/7 cyber security specialized team to monitor and detect threats targeting the environment based on standard operating procedures in order to promptly notify and assist the client.
Having a 24/7 network operations center team monitoring supervising, monitoring and maintaining the infrastructure in regards to availability, storage, bandwidth, etc.
Creation of an active honeypot environment to proactively lure malicious users in order to deflect potential attacks and gather valuable information on their hacking methodologies
Assist organizations in deploying or enhancing their own SIEM’s by building the required use-cases, standard operating procedures, logs fine-tuning, etc. as well as providing our own advanced SIEM solution TACE delivering an all-in-one security intelligence view.