Security Operations Center (SOC) services

Cybersecurity

BMB embodies 25+ years of experience and leadership in the world of Information and Communication Technology. Building on our leading capabilities, trusted reputation, multidisciplinary cyber security services, and national and international reach, we are committed to offering the best-in-class cyber services.
  • null

    The objective is to help organizations developing their cyber vigilance capability by advising, implementing and operating a managed SOC, on-premises or on the cloud, with use cases that fit each business, logs fine-tuning and a proved threat intelligence and exchange capability.

  • null

    Internal and external threats detection

    One of the SOC main objectives is to have a holistic view of the client’s environment. BMB SOC approach is to detect both internal and external threats targeting our client by first understanding the organization, crown jewels, threats, internet presence, etc. and then ensuring all detection mechanisms are well enhanced, implemented and maintained.

  • null

    Incident response

    We assist in responding to cyber security incidents by ensuring the required measures in stopping the bleeding and isolating the infected systems and proceeding with the required identification and forensics associated with the incident.

  • null

    Vulnerability management

    Having a proactive approach in order to consistently identify internal and external vulnerabilities present within the infrastructure and provide the required recommendations in order to remediate them accordingly.

  • null

    Cyber Threat Intelligence

    The cyber threat intelligence is provided via our CTI tool that scrapes deep & dark web onions & hunts leaked info in the cyberspace, identifies threats and prevents attacks. It is a powerful tool for keeping your company’s info safe & your digital footprint monitored.

  • null

    Managed services

    This service aims to assist the clients by providing on-demand specialists to execute configuration hardening and manage different systems within the infrastructure and ensure a secure and protected network.

  • null

    SOC pillars development and enhancement

    The objective of this exercise is to assist the organization in both developing and enhancing an internal security operation center by focusing on the 3 pillars people, process and technology.

  • null

    24/7 automated and manual threat hunting

    Having a 24/7 cyber security specialized team to monitor and detect threats targeting the environment based on standard operating procedures in order to promptly notify and assist the client.

  • null

    Network infrastructure monitoring

    Having a 24/7 network operations center team monitoring supervising, monitoring and maintaining the infrastructure in regards to availability, storage, bandwidth, etc.

  • null

    Honeypot deployment

    Creation of an active honeypot environment to proactively lure malicious users in order to deflect potential attacks and gather valuable information on their hacking methodologies

  • null

    SIEM deployment and fine-tuning

    Assist organizations in deploying or enhancing their own SIEM’s by building the required use-cases, standard operating procedures, logs fine-tuning, etc. as well as providing our own advanced SIEM solution delivering an all-in-one security intelligence view.