
Hi-Tech Virtual SOC (vSOC)
24/7 information security monitoring and management support service centralized on a cloud computing platform.
I. INFORMATION
Hi-Tech Virtual SOC is a centralized information security threat monitoring and handling service of Pho Tue SoftWare Solutions JSC. Supporting customers with comprehensive monitoring 24/07/356 by a team of leading cybersecurity experts of Pho Tue SoftWare Solutions JSC.
The service helps organizations quickly detect abnormal behavior and respond to security incidents, minimize risks and threats from attacks and automatically respond to threats.
Hi-Tech Virtual SOC service is built on the OPEN XDR platform, one of the pioneering and leading technologies in the market, provided at a reasonable, competitive cost, with clear service quality commitments (SLA).
The solution is capable of collecting, monitoring and analyzing data from many different environments and platforms: Application, Endpoint, Network, Server, Virtualization or Multi Cloud environments of large solution providers such as: Viettel, CMC, FPT and other providers AWS, Azure, Google Cloud.
II. FEATURES
- Comprehensive 24/7 Monitoring
Monitor and scan threats on server systems, workstations, applications, network traffic 24/7/365 and detect abnormal signs in the customer's system. - Threat Hunting & Reporting
Active Threat Hunting at all stages of attack based on Machine Learning, AI, Big Data technology to track intrusion attacks, exploit vulnerabilities, analyze abnormal behavior or APT. - Investigation, security coordination and automated response
SOC experts prioritize investigation of attack alerts to eliminate false alarms and use the SOAR module to respond to threats automatically. - Centralized & Personalized Management
Centralized management interface for comprehensive monitoring, and personalized interface for each customer (Multi Tenant), and support 2-factor authentication (2FA) for users. - Next-Gen Open XDR platform
Using AI, Big Data, Threat Intelligence, SOAR, SANDBOX, UEBA, anti-Phishing, Deception, NTA technology. Automatically collect, enrich, detect, investigate, trace and respond to information security. Improve the average time to detect (MTTD) by 8 times, the average time to respond (MTTR) by 20 times. - Response and handle information security loss warnings 24/7
As soon as an intrusion attack is detected, SOC experts will investigate, localize and isolate the attack scope from the customer's network system, send warning information to the customer for timely handling.