{"id":82,"date":"2018-12-11T17:43:00","date_gmt":"2018-12-11T09:43:00","guid":{"rendered":"http:\/\/115.159.161.242\/cn\/?page_id=82"},"modified":"2022-12-28T13:09:42","modified_gmt":"2022-12-28T05:09:42","slug":"soc","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=82","title":{"rendered":"Security Operations Center"},"content":{"rendered":"\n<h4 class=\"has-text-align-center wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:300;line-height:1.4\"><\/h4>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">SOC\/Security Operation Center Can help companies improve the maturity of security management in their environment<\/p>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>The SOC is a traditional responsive set of standard services including log management, real-time monitoring, incident response and investigation through a combination of people, processes and technology.\u00a0The new generation of SOC is data-driven and uses adaptive security architecture for environment and situational awareness and machine learning to enable advanced discovery, response and investigation analysis to use such automated or semi-automated tools, processes and policies to combat the next generation of threats.<\/li><\/ul>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>With the continuous improvement of IT application degree and information security management level in domestic industry, enterprises will have substantial demand for supporting facilities of security management such as security operation center (SOC), which will be a more obvious development trend.<\/li><\/ul>\n\n\n\n<ul style=\"font-size:15px;font-style:normal;font-weight:300\"><li>Considering the difficulty of directly implementing information management changes under the current level of informationization in domestic enterprises, it is relatively less resistant to try to establish security capabilities from a technical perspective first, and the SOC can effectively promote the development and implementation of corresponding management processes.<\/li><\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"800\" height=\"531\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/04\/2.jpg\" alt=\"\" class=\"wp-image-4978\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/2.jpg 800w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/2-600x398.jpg 600w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/2-300x199.jpg 300w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/2-768x510.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1440\" height=\"1080\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/04\/3.jpg\" alt=\"\" class=\"wp-image-4980\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/3.jpg 1440w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/3-600x450.jpg 600w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/3-300x225.jpg 300w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/3-1024x768.jpg 1024w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/3-768x576.jpg 768w\" sizes=\"(max-width: 1440px) 100vw, 1440px\" \/><\/figure>\n<\/figure>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">We can help you with planning, design and implementation, and help your business truly prioritize continuous operation and improvement over the long term.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-13 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column has-white-color has-text-color has-background has-link-color wp-elements-e90fea0d3ba28c24c16e2d3e803ac738 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#cd797b;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em;flex-basis:300px\">\n<h5 class=\"has-text-align-center has-white-color has-text-color has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300;text-transform:lowercase\">Consultation<\/h5>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<ul style=\"font-size:15px\"><li>Environmental Research<\/li><li>Blueprinting<\/li><li>Planning and Design<\/li><li>Security framework, standards and best practices<\/li><li>Combination of long-term planning and short-term tasks<\/li><\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-text-color has-background has-link-color wp-elements-051884fd1c67b4ce4709559198368ea0 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#f7b183;color:#4d4444;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em;flex-basis:300px\">\n<h5 class=\"has-text-align-center has-text-color has-medium-font-size wp-block-heading\" style=\"color:#6f7376;font-style:normal;font-weight:300;text-transform:lowercase\"><strong>Build<\/strong><\/h5>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-css-opacity has-background is-style-wide\" style=\"background-color:#6f7376;color:#6f7376\"\/>\n\n\n\n<ul class=\"has-text-color\" style=\"color:#6f7376;font-size:15px\"><li>Infrastructure Construction<\/li><li>Platform and tool deployment<\/li><li>Security Visualization Scenarios<\/li><li>Usecase implementation and setup<\/li><li>Process customization<\/li><li>Commissioning and optimization<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-9 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-white-color has-text-color has-background has-link-color wp-elements-29d5d90c238850e80ed51ecb933c2fe1 is-layout-flow wp-block-column-is-layout-flow\" style=\"background-color:#cd797b;padding-top:2em;padding-right:2em;padding-bottom:2em;padding-left:2em;flex-basis:300px\">\n<h5 class=\"has-text-align-center has-white-color has-text-color has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300;text-transform:lowercase\">Operations<\/h5>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-white-color has-css-opacity has-white-background-color has-background is-style-wide\"\/>\n\n\n\n<ul style=\"font-size:15px\"><li>7x24x365 real-time monitoring<\/li><li>T1\/T2+ Threat Analysis<\/li><li>Threat Intelligence<\/li><li>Periodic and trend analysis<\/li><li>Advanced Threat Assessment<\/li><li>Management-oriented security reporting<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons alignfull is-horizontal is-content-justification-center is-layout-flex wp-container-11 wp-block-buttons-is-layout-flex\"><\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">SOC-as-a-Service is a fully managed form of capability delivery that can help you and your organization fully cover the people, technology and processes in SOC<\/p>\n\n\n\n<div class=\"wp-block-columns alignfull is-layout-flex wp-container-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-16 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:15px;font-style:normal;font-weight:300\">\u2022  Unified and centralized service cloud approach with tiered progression<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:15px;font-style:normal;font-weight:300\">\u2022  Deep linkage with different security vendors to maximize the value of security investments<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:15px;font-style:normal;font-weight:300\">\u2022  Real-time (7X24) monitoring, analysis and response<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220514-192239@2x-1.png\" alt=\"\" class=\"wp-image-5617\" width=\"407\" height=\"273\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-192239@2x-1.png 1388w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-192239@2x-1-768x517.png 768w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/figure><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\"><strong>Flexibility to combine functional modules on demand<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=62\">\u5b89\u5168\u65e5\u5fd7\u76d1\u63a7\u670d\u52a1<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=63\">\u5b89\u5168\u65e5\u5fd7\u5206\u6790\u670d\u52a1<\/a><\/p>\n\n\n\n<p><a href=\"http:\/\/52.82.126.160\/?page_id=237\">\u5b89<\/a><a href=\"https:\/\/www.cloudfall.cn\/?page_id=237\">\u5168\u4e8b\u4ef6\u54cd\u5e94\u670d\u52a1<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=64\">\u5a01\u80c1\u667a\u80fd\u670d\u52a1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SOC\/Security Operation Center Can help companies improv [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":84,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/82"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=82"}],"version-history":[{"count":38,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/82\/revisions"}],"predecessor-version":[{"id":6612,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/82\/revisions\/6612"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/84"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}