Solution: Security Operations Center (SOC)

Solution: Security Operations Center (SOC)


TÜV AUSTRIA | United Kingdom

01 Meadlake Place, Thorpe Lea Road, Egham (Visiting Address) TW20 8BF United Kingdom

+44 7585 678493

Send email

CSOC - Certified Security Operations Center GmbH

Region: Nordrhein-Westfalen

Adenauerallee 45-49 53332 Bornheim Deutschland

+49 2222 99222 0


Send email


Security Operations Center (SOC)

In which region do you need this solution?

  • All regions

Fred Schmidt


"security operation centre monitors your IT systems for possible cyber attacks and protects against data loss."

The SOC as a service monitors your IT systems for possible cyber attacks and protects against production downtime, data loss, image damage, etc and the associated financial risks.

With the combination of automatic detection and the use of expert knowledge, the SOC as a Service ensures the fastest possible detection of various attack scenarios.

Further optional services can be booked in addition to this core service of the SOC as a Service:

Active Response

The SOC as a Service also includes the Active Response option and the Auto Escalation function. In the event of an attack, the system can intervene automatically if desired and disconnect or block systems from the network (Active Response) and actively warn other systems (Auto Escalation).

24/7 control centre service

With the 24/7 control centre, we offer our customers monitoring services around the clock. It takes over the active monitoring and analysis of all integrated systems, detects IT vulnerabilities, alerts in case of threats and reports immediately to the IT managers.

With the help of supplementary IT security checks, our cyber security experts check the IT infrastructure, networks and web applications thoroughly, using methods and techniques similar to a real hacker attack. For example, our Red Team continuously simulates attacks to generate probability estimates of successful compromises.

V-Scan – Additional examinations on defined systems

The V-Scanner (vulnerability scanner), which is also optional, actively examines your target systems for actual vulnerabilities related to your operating system, services and configurations.

The findings help administrators identify and fix patch flaws and misconfiguration’s that can be used immediately to attack IT systems. The results of the V-Scanner are seamlessly integrated into the CSOC customer dashboard, from where information on the identified vulnerabilities can be extracted and used to remediate them.

OT security

In addition, we are developing enhanced OT security solutions for our industrial and healthcare customers that quickly detect attack attempts and give companies time to respond before attackers can cause damage. This includes solutions such as Anomaly Machine Learning, which can detect abnormal behaviour within assets and network communications.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

I am tami

Are you here for the first time? I will be happy to help you find your way around.

Check certificate

  • Person Certificate

  • Product Certificate

  • System Certificate

  • Verification of Conformity

Enter the data and check a certificate

Find a solution

WiPreis einreichen