Cyber Security as a Service (CSaaS) & SOC as a Service
n'guard SOC as a Service & Cyber Security as a Service
After an IT security check, we put together the individual protection components according to your personal needs.
Your advantages at a glance
- Our IT experts are certified specialists in this field
- We have the right solution for every weak point
- Complete 24/7 SOC service for the first time also for SMEs and sole proprietorships
- Holistic concept for complete cyber protection.
- With our experience, your IT infrastructure is in safe hands
- Complete package bundle, monitoring, forensic analysis & recommended action, proactive risk minimisation as a personal service.
- The service includes 24/7 monitoring, active notification by our incident response team, forensic evaluation of reports and alerts, alerting and recommended action by our specialists, proactive risk mitigation.
- In combination with the monitoring of all devices (server, workstation, laptop, mobile, firewall, WLAN), we are able to recognise the attackers early and, depending on the attack pattern, initiate decisive measures to protect your data and infrastructure. In this way, we minimise your risk of data theft, misuse, blackmail, server and production standstill, data corruption and much more.
- The SOC service includes the following software and add-ons: WatchGuard EPDR, Datacontrol (GDPR/DSGVO) Monitoring, Actionable insights, Siem Feeder, and advanced reports, as well as our analysis work.
- The patch management licence is included, only the SLA regarding the number of devices has to be purchased.
- Depending on the structure of your system environment, we then recommend upgrading your environment, e.g. WI-FI or firewall, if they are not state of the art.
SOC Service in 6 steps
Comprehensive protection for your IT infrastructure – individually tailored to your needs.
01.
Needs assessment
- Audit at a fixed price
- Clarification of your needs
- Clarification of further steps for your SOC service
Β
In the first step of a SOC service to be created, your needs are analysed in detail and the next step is planned precisely. For an in-depth analysis, we recommend our IT Security Check, which can also uncover vulnerabilities that are not on the radar of your IT department or may not have been noticed.
02.
Acquisition of information
- Together with your IT we procure the ACTUAL state
- Manual inspection and verification of the ACTUAL condition based on our experience
Β
In the second step, the needs analysis is compared with the current analysis and the corresponding measures are discussed and verified. In order for the components to be optimally matched to your existing IT, a preliminary concept is required here in cooperation with your IT department.
03.
Catalogue of measures and components Selection
- Catalogue of measures and components Selection
- Recommendations and support to eliminate current risks
Β
Im dritten Schritt wird das Sicherheitskonzept erstellt. DafΓΌr werden alle Komponenten genau bestimmt und aufeinander abgestimmt. Des Weiteren wird in diesem Schritt auch die Empfehlungen fΓΌr Infraktruktur- oder Prozessanpassungen abgegeben.
04.
Implementation and onboarding
- Active implementation of the safety concept
- Implementation and execution of the infrastructure changes.
Β
In the fourth step of the onboarding of our SOC service, the security concept is implemented and processes as well as new hardware and software are implemented. This active step can also take place outside your working hours.
05.
Final report and handover of monitoring to our SOC Service Team
- Clear report and final discussion with the technical manager
- Preparation of the catalogue of measures under step six
Β
During the previous steps, everything was done to implement this step. In this step, the handover to our SOC team takes place. This also includes short tests.
06.β
- Verification that all measures according to the concept stand up.
- Recommendations and support to eliminate future risks
Β
On the basis of the final report, we will offer to carry out a further pentest or a first-time pentest. Here, the stability of the implemented measures can be tested and evaluated.
Eliminate the biggest security risks in your business with our Cyber Security as a Service service.
As a Managed Security Provider and Gold Partner of Watchguard, we offer you a cost-effective solution to protect your network infrastructure (Windows, MAC & Linux endpoints & servers) against malware & ransomware attacks from the Internet.
We put together the individual components according to your personal needs.
Our cybersecurity specialists monitor your network 24/7 hours and take care of your security.
Advanced security technology
WatchGuard EPDR is not just an antivirus tool! WatchGuard EPDR uses Advanced Security Technologies to keep you safe.
Cloud Management
WatchGuard Endpoint Security is managed in the WatchGuard Cloud platform by n'cloud.swiss AG.
Configuration and Monitoring
For SMEs and private customers, we take over the configuration based on our many years of experience. In addition, we monitor attempts to attack your PC and laptops and are at your side with advice and action.
Infrastructure Management
In larger organizations, the admin can manage the infrastructure himself and make rules and settings according to the company policy. We are happy to support you with our knowledge and best practice.
Modern and Holistic Cyber Security Solution
In larger organizations, the admin can manage the infrastructure himself and make rules and settings according to the company policy. We are happy to support you with our knowledge and best practice.
Shorter Response Time
Reduce average detection time and average response time.
Custom Rules
Join us in creating new rules that represent new IoAs that can be sent to endpoints to quickly protect against new attacks.
Recommendations from Professionals
Receive recommendations on how to minimize attack surfaces and mitigate attacks to be better protected against in the future.
Individual Security Concept
WatchGuard Endpoint Security works optimally if the WatchGuard firewall and the WLAN access point are also taken into account in the security concept. We would be happy to help you develop a security concept.
Free Support
Our experts are there for you during normal working hours and will support you with our free support.
Additional Modules
In addition to the WatchGuard EPDR solution against cyber attacks, further modules can be added as required:
Our Cyber Security Solutions
Comprehensive protection for your IT infrastructure – individually tailored to your needs.
Β
Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β Β These services are only available as an annual subscription.
CHF 8.50
/month
Protection against cutting-edge cyber attacks β APTs, zero-day malware, ransomware, phishing, rootkits, in-memory exploits, malware-free attacks, IDS, firewall, device control, and URL and content filtering capabilities.
CHF 9.90
/month
WatchGuard Data Control monitors personal and confidential data on endpoints. The tool automatically detects and validates personal data to ensure legal compliance.
CHF 5.70
/month
WatchGuard Full Encryption works with BitLocker, a proven and robust Microsoft technology to encrypt and decrypt disks without compromising end users. It also provides the added value of centralized control and management of recovery keys stored on WatchGuardβs cloud-based management platform.
CHF 3.70
/month
The Advanced Reporting Tool (ART) platform automates the storage and reconciliation of process data extracted from endpoints by WatchGuard EDPR and WatchGuard EDR, with no need to invest in infrastructure, facilities or maintenance.
CHF 5.50
/month
With WatchGuard Patch Management, you can identify, prioritize, and deploy critical patches for Windows operating systems and third-party applications to prevent cyberattacks and mitigate known vulnerabilities.
CHF 5
/month
Our unique MFA solution goes far beyond traditional 2-factor authentication and considers innovative ways to identify users. You can use MFA to protect the network, VPNs and cloud applications.