Do you want to switch the language?

Start with one module and
build comprehensive protection.

The KBC Cyber Defense Center is an extended Security Operation Center (SOC), it reacts quickly to attacks and helps to initiate countermeasures efficiently. The service has a modular structure and can be used flexibly according to customer requirements by means of individual modules (NSM, EDR, LOG, etc.). Behind the modules, threat intelligence information is compared with the existing data of the modules and, if possible and reasonable, automatically alerted or analysed.

Our holistic IT security approach

Our specialists act and react dynamically and holistically. No aspect, no access point is neglected. An overall strategy for the benefit of our customers - based on the four security segments Prevent, Protect, Detect and Respond.

Uncovering weaknesses and process and structural problems

  • Security Audit
  • Security Architecture Review
  • IT Risk Management
  • Access Control

The classics among the security solutions, from the firewall to encryption

  • Network Security
  • Content Security
  • APT Solutions
  • Application Security

Specific services that become important after an attack

  • Countering attackers
  • Incident Response (-Readiness)
  • Forensic Analysis

Detection of system infections

  • Security Monitoring
  • Compromise Assessment
  • Vulnerability Assessment

The K-Businesscom Managed SOC Service

An optimal portfolio of services and products at the latest technological an optimal portfolio of services and products at the cutting edge of technology is available at all times.

Network Security Monitoring

  • Recording of network traffic
  • Automated and manual analysis
  • Anomaly detection
  • Network forensics

Endpoint Detection & Response

  • Endpoint Visibility
  • Live-Remote-Analysis
  • Remote Data Collection
  • Endpoint Isolation

Log Analysis

  • SIEM
  • Log aggregation and evaluation
  • Statistical analyses
  • Data correlation

Vulnerability Management

  • Asset Discovery
  • Vulnerability reporting
  • Proactive tracking
  • Enrichment through Threat Intelligence

Threat Intelligence

  • Threat Landscape
  • Threat Actor & Campaign Tracking
  • Brand & Credential Monitoring

Operational Technology Monitoring

  • Specialisation in OT devices and protocols
  • Continuous monitoring
  • Overview of assets and communication flows
  • Detection of attacks and vulnerabilities