Security Operations Center & SOC as a Service
One step ahead of cyber criminals.
Continuous cyber defense through Cyber Threat Intelligence and 24/7 monitoring
Early detection and efficient response to threats
Flexible SOC model – Suitably scalable for the requirements of medium-sized companies
Would you like to set up a professional SOC and SIEM, expand your existing SOC architecture, or outsource it as a SOC as a Service?
The combination of preventive protective measures, early detection of attacks, and effective control is more essential today than ever before. Setting up the appropriate technology and the associated skills and processes in-house is very challenging for many companies. Protecting corporate resources requires a modern, continuously tested, and integrative security architecture.
A professionall Security Operations Center (SOC) offers you continuous, efficient security monitoring as well as a rehearsed and proven response.
Continuously strengthening cyber defense
SECURITY FACTORY | DETECT & RESPOND | SECURITY OPERATION CENTER
The Possehl Security Operations Center as a service
The Possehl Security Operations Center uses state-of-the-art technology and highly specialized, trustworthy experts to monitor your digital vulnerability.
The SOC and its experts are based in Germany and have many years of experience threat intelligence in both medium-sized and enterprise environments. True to the motto “attack is the secret of defense; defense is the planning of an attack”, we deploy experts in both offensive and defensive security. Our knowledge of the attackers' motivation, tools, tactics and procedures (TTPs) enables us to counter attacks efficiently and effectively.
Within the SOC, we use a range of technologies and services, including:
Endpoint Detection & Response (EDR)
Network Detection & Response (NDR)
Security Information and Event Management (SIEM)
Security Orchestration Automation & Response (SOAR)
The choice is yours.
SOC as a managed service
As your SOC supplier we take over the secure operation of your security infrastructure or specific sub-areas such as vulnerability management or attack detection and response as a SOC as a Service.
Optimized SOC managed on your own
We support you with our expertise and the best suitable SOC product solutions.
Our EDR & SOC Service Packages
Package #1
Managed EDR | Endpoint Detection & Response
Getting started with automated attack detection: Monitoring your endpoints with Elastic Security or Microsoft Defender for Endpoint.
Ideal for companies that want to strengthen their basic IT security posture and take their first steps toward active threat monitoring.
Package #2
Managed XDR | Extended Endpoint Detection & Response
Expansion of the scope of services from Package #1 to include vulnerability management (Level 2) and identity monitoring (UEBA – User and Entity Behavior Analytics).
Additional XDR features, including hardening and security monitoring for Microsoft 365 cloud services (mail, file storage, chat), as well as monitoring of third-party cloud-based applications via a CASB (Cloud Access Security Broker) are also included.
Ideal for organizations with advanced security levels and more complex IT landscapes that want to centrally secure cloud services and user activities in addition to endpoints.
Package #3
Managed Endpoint Detection & Response (MDR) | Comprehensive SOC
Includes all services from Package #2 plus a central SIEM (Elastic Security or Microsoft Sentinel) and vulnerability management (Level 3).
Ideal for companies with high security levels, large endpoint and cloud environments, and strict compliance or risk profiles that require a comprehensive SOC (Security Operations Center including SIEM (Security Information and Event Management).
Interested in more information?
Contact us for a non-binding consultation!
The path to your SOC strategy
Requirements analysis
Threat, maturity, and GAP analysis
Analysis of architecture and vulnerabilities
with Cyber Incident Simulations
SOC Blueprint
Product selection, design, and architecture
SOC rollout
on premises or in the Cloud
Connection of specific data sources
Effectiveness review
with Cyber Incident Simulations
Handover to operation
In-house operation, hybrid approach, or SOC as a Service
Operation of the SOC service
optionally by Possehl Secure Experts
Continuous improvement process,
Effectiveness tests, cyber incident simulations
Possehl SOC
– so individuell wie Ihre IT-Landschaft
Since our customers' IT environments, assets requiring protection, regulatory requirements, and ultimately their budgets vary, we design highly customized architecture tailored to their requirements, including the associated technology and service levels.
On this basis, we continuously monitor the environment and respond to security incidents at an early stage. To this end, we establish efficient communication and response mechanisms to ensure that the environment is restored to its normal state in a targeted manner.
After commissioning, our customers are also continuously provided with relevant information about attacks and service quality. Optionally, customers can access a security cockpit where they can view the status of the environment.
At regular intervals, targeted simulated attacks are carried out on the environment, including with rotating vectors and tools: this allows the effectiveness of the SOC to be continuously assessed and improved.
Your benefit –
our added value
Risks and errors can never be completely avoided. However, a coordinated, multi-layered security architecture and continuous monitoring allow threats to be detected and contained at an early stage.
Despite increasing automation in IT, experienced and well-trained specialist personnel remain essential. Our team of security experts monitors your systems 24/7, detects threats and initiates targeted countermeasures.
We analyze your existing IT security architecture and develop a tailor-made SOC concept. You remain flexible: you can optimize your own SOC or outsource certain tasks to Possehl Secure. In the case of a Managed Security Operations Center, we define requirements, service levels and KPIs on a highly individual basis.
In addition, important requirements from best practice frameworks (e.g. CIS Control, in particular Control 8, 10 and 13) and regulatory requirements (e.g. NIS2 and DORA) are addressed.
Our philosophy is based on a 360° view of IT security, vendor-neutral advice and a partnership of equals. Our aim is to provide you with a customized, future-proof security solution that protects your company in the long term. Based on this, you can concentrate on your core business with greater peace of mind.