Edge UOL has just announced a new version of the SOC (Security Operation Center) — a recently improved integrated security solution for companies in different segments that can now rely on monitoring for threat and incident analysis, incident management support, reporting and communication, vulnerability management, and brand monitoring.
Edge UOL’s solution makes it possible to continuously monitor clients’ assets in order to detect and respond to any suspicious activity or anomaly that poses a threat. By using market-leading solutions and machine learning and artificial intelligence techniques to analyze high volumes of data in real time, detection and response become more accurate and efficient.
Edge UOL professionals also provide support during incident response, determining the nature, scope and impact of the incident, and act to mitigate damage and recover security, in addition to actively looking for hidden and unknown threats by monitoring threat intelligence sources, such as security information feeds, for updates on the latest trends, attacks, and techniques used by cyber attackers.
Customer assistance is provided by sending logs to SIEM (Security Information and Event Management), ensuring the real-time centralization and analysis of security events. Edge UOL delivers monthly management reports with detailed information summarizing all the activities conducted in the period.
The SOC implementation process consists of a five-phase schedule:
- Kick-off meeting
- Service implementation
- Logging
- Refining rules, starting weeklys, creating playbooks, delivering project documentation and the project itself with the first month’s report
- Other logs, refining of rules, and completion of playbooks
“Together, all phases demand approximately ten weeks, with continuous alignments between our multidisciplinary team and the client,” explains Rodrigo Lobo, COO of Edge UOL.
The most important benefits of the new service were also listed by the company:
- Integration: The centralization of security data with intelligence allows the generation of useful information to protect the business and the client’s image
- Proactivity: The use of an integrated SIEM, together with the specialized SOC team, makes it possible to manage security proactively through research (Threat Hunting), event correlation, and intelligent monitoring (Threat Intelligence)
- Prevention: Through the assets integrated into the SOC and policies that reflect the sensitivity of the business, it is possible to have a holistic view, facilitating the adoption of preventive measures and thus avoiding security incidents
- Response: In crisis scenarios, the use of a SOC allows for rapid response times, preventing further damage to client information and to brand visibility.
“Edge UOL stands out through its multi-service approach, enabling organic and effective collaboration between different areas. This synergy connects everything from security services to the management of our clients’ environments, establishing a proactive stance in the provision of services,” adds Lobo.