{"id":903,"date":"2019-11-19T07:11:20","date_gmt":"2019-11-19T07:11:20","guid":{"rendered":"https:\/\/os-br.com\/?page_id=903"},"modified":"2023-05-30T15:19:46","modified_gmt":"2023-05-30T15:19:46","slug":"security-operations-center","status":"publish","type":"page","link":"https:\/\/os-br.com\/pt\/security-operations-center\/","title":{"rendered":"Centro de Opera\u00e7\u00f5es de Seguran\u00e7a"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#ededed&#8221; background_image=&#8221;https:\/\/os-br.com\/wp-content\/uploads\/2019\/11\/SOC.jpg&#8221; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;100px||100px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; header_font_size=&#8221;60px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; text_orientation=&#8221;center&#8221; background_layout=&#8221;dark&#8221; module_alignment=&#8221;center&#8221; z_index_tablet=&#8221;500&#8243; use_border_color=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"hh\" style=\"font-size: 50px;\"><\/h2>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;20px||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; inner_width_tablet=&#8221;50px&#8221; inner_max_width_tablet=&#8221;50px&#8221; custom_padding=&#8221;20px||20px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;||0px|&#8221; custom_padding=&#8221;||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Optimus Security Operations Center (\u201cSOC\u201d)<\/h2>\n<p>The Optimus SOC will monitor security issues and provide a rapid solution and response to security-related problems.\u00a0\u00a0A\u00a0\u00a0client\u2019s sensitive information and other sensitive data areas like websites,\u00a0\u00a0databases, servers, and networks will be monitored, assessed and defended.<\/p>\n<p>The Optimus SOC Services will enable organizations to reduce costs and complexity typically associated with network security while improving security posture and easing the compliance burden.\u00a0 We leverage our security expertise to empower a\u00a0\u00a0client\u2019s\u00a0\u00a0IT\u00a0\u00a0department, allowing clients to focus on core business activities without distraction.<\/p>\n<p>The Optimus SOC will keep businesses\u00a0\u00a0up and running at optimum capacity,\u00a0\u00a0continuously, efficiently, and always up-to-date.\u00a0\u00a0We manage the client\u2019s selected security devices, ensuring appropriate configuration and the ongoing identification and patching of vulnerabilities\u00a0\u00a0\u2013\u00a0\u00a0all while staying up-to-date with relevant software upgrades and backups.<\/p>\n<p>The SOC\u00a0\u00a0ensures risk-free,\u00a0\u00a0secure services that protect its\u00a0\u00a0client\u2019s\u00a0\u00a0IT infrastructure and mission-critical data.\u00a0 Optimus engineers will identify cyberattacks that have evaded conventional\u00a0\u00a0IT\u00a0\u00a0security. Suspicious patterns are identified through behavioral analysis of network traffic and end-point activity.\u00a0\u00a0Our SOC validates incidents along with specific and actionable supporting information.<\/p>\n<p>The\u00a0\u00a0Optimus\u00a0 Security\u00a0\u00a0Operations\u00a0\u00a0Center\u00a0\u00a0offers\u00a0\u00a0its\u00a0\u00a0Clients:<\/p>\n<ul>\n<li>Reduced\u00a0\u00a0Costs<\/li>\n<li>Reduced\u00a0\u00a0Complexity<\/li>\n<li>Improved\u00a0\u00a0Network\u00a0\u00a0Security<\/li>\n<li>Reduced\u00a0\u00a0Risk<\/li>\n<li>Reduced\u00a0\u00a0Compliance\u00a0\u00a0Burden<\/li>\n<\/ul>\n<p><strong>Certifications.<\/strong><\/p>\n<p>The following industry-leading certifications, among others, are held by SOC Engineers and Technicians:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_2,1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<table>\n<tbody>\n<tr>\n<td>CCIE<br \/>CCNP<br \/>CCIP<br \/>CCNA<br \/>CCDA<br \/>CCENT<\/td>\n<td>JNCIA<br \/>JNCIS<br \/>CEH<br \/>CISSP<br \/>VPC-DCV<br \/>VPC-NV<\/td>\n<td>VCA<br \/>MCSE<br \/>MCP<br \/>MCITP<br \/>Linux+<br \/>SuSE Linux<\/td>\n<td>A+<br \/>Network+<br \/>Security+<br \/>ISM<br \/>NCDA<br \/>ITIL<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_phone=&#8221;50px&#8221; max_width_phone=&#8221;1280px&#8221; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Monitoring<\/strong><strong>\u00a0\u00a0\u00a0<\/strong><strong>Systems.<\/strong><\/p>\n<p>The Optimus\u00a0 SOC\u00a0\u00a0Team will identify cyberattacks that have evaded conventional IT\u00a0\u00a0security.\u00a0\u00a0Suspicious patterns are identified through behavioral analysis of network traffic and end-point activity.\u00a0\u00a0Our\u00a0\u00a0SOC validates incidents along with\u00a0\u00a0specific and actionable supporting information.<\/p>\n<p>Ongoing monitoring will provide our Incident\u00a0\u00a0Response Teams immediate access\u00a0\u00a0to an extremely network snapshot,\u00a0\u00a0not just during the attack, but preceding the attack.\u00a0 First responders will respond remotely, followed in short order by \u201cboots on the ground\u201d when necessary.<\/p>\n<p>Our\u00a0\u00a0Security Analysts will utilize advanced techniques including event correlation, data mining,\u00a0\u00a0and behavioral modeling to prevent complex threats that are difficult for in-house teams to detect.\u00a0 We will provide a seamless end-to-end solution,\u00a0\u00a0ensuring\u00a0\u00a0the client will never have any gaps in security coverage. The SOC will monitor the client\u2019s IT\u00a0\u00a0infrastructure\u00a0\u00a024x7x365,\u00a0\u00a0eliminating the need for the client to staff an\u00a0internal security team around the clock.<\/p>\n<p>Optimus&#8217;s compliance expertise will reduce the complexity and costs of meeting regulatory compliance thereby helping clients avoid heavy fines.\u00a0\u00a0We will provide clients with compliance report templates to assist clients meeting the requirements specified by the\u00a0\u00a0PCI-DSS,\u00a0\u00a0GLBA,\u00a0\u00a0HIPAA,\u00a0\u00a0and other regulatory organizations.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Threat\u00a0\u00a0Monitoring:<\/strong><\/p>\n<ul>\n<li>Performance\u00a0\u00a0Monitoring<\/li>\n<li>Availability\u00a0\u00a0Monitoring<\/li>\n<li>Event\u00a0\u00a0Monitoring<\/li>\n<li>Change\u00a0\u00a0Monitoring<\/li>\n<li>Security\u00a0\u00a0Monitoring<\/li>\n<li>Security\u00a0\u00a0Event\u00a0\u00a0Aggregation<\/li>\n<li>Security\u00a0\u00a0Noise\u00a0\u00a0Event\u00a0\u00a0Suppression<\/li>\n<li>Security\u00a0\u00a0Event\u00a0\u00a0Correlation<\/li>\n<li>Security\u00a0\u00a0Event\u00a0\u00a0Searching<\/li>\n<li>Security\u00a0\u00a0Compliance\u00a0\u00a0Reports<\/li>\n<li>Escalation\u00a0\u00a0and\u00a0\u00a0Alerts<\/li>\n<li>Expertise\u00a0\u00a0on\u00a0\u00a0Demand<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Threat\u00a0\u00a0Management:<\/strong><\/p>\n<ul>\n<li>Availability\u00a0\u00a0Management<\/li>\n<li>Event\u00a0\u00a0Management<\/li>\n<li>Configuration\u00a0\u00a0Management<\/li>\n<li>Incident\u00a0\u00a0Management<\/li>\n<li>Change\u00a0\u00a0Management<\/li>\n<li>Release\u00a0\u00a0Management<\/li>\n<li>Vendor\u00a0\u00a0Management<\/li>\n<li>Managed\u00a0\u00a0Network\u00a0\u00a0IDS\/IPS<\/li>\n<li>Managed\u00a0\u00a0Firewall<\/li>\n<li>Managed\u00a0\u00a0Web-Proxy<\/li>\n<li>Managed\u00a0\u00a0Email\u00a0\u00a0Gateway<\/li>\n<li>Product\u00a0\u00a0Life-Cycle\u00a0\u00a0Management<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_color=&#8221;#002041&#8243; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.17.6&#8243; background_layout=&#8221;dark&#8221; z_index_tablet=&#8221;500&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4 style=\"text-align: center;\">For More Information on Optimus Security Operations Center<\/h4>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;mailto:sam@sas-us.com&#8221; button_text=&#8221;Contact Us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; background_layout=&#8221;dark&#8221; custom_margin=&#8221;||20px|&#8221; z_index_tablet=&#8221;500&#8243; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Optimus Security Operations Center (\u201cSOC\u201d) The Optimus SOC will monitor security issues and provide a rapid solution and response to security-related problems.\u00a0\u00a0A\u00a0\u00a0client\u2019s sensitive information and other sensitive data areas like websites,\u00a0\u00a0databases, servers, and networks will be monitored, assessed and defended. The Optimus SOC Services will enable organizations to reduce costs and complexity typically associated with [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-903","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/comments?post=903"}],"version-history":[{"count":25,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/903\/revisions"}],"predecessor-version":[{"id":2185,"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/pages\/903\/revisions\/2185"}],"wp:attachment":[{"href":"https:\/\/os-br.com\/pt\/wp-json\/wp\/v2\/media?parent=903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}