Qvach – SOC as a Services

An Efficient & Cost-Effective SOC for Your Organisation

Pyramid Cyber Security & Forensics Pvt Ltd believes that security need not be expensive or time-consuming but should be comprehensive log and network monitoring, correlating it to external intelligence such as threat feeds.

Our SOC’s hybrid distributed architecture enables fetching endpoint logs from multiple geographies and correlate them.

We understand each of our customers has unique needs and goals. Our Managed SOC service is the most flexible in the industry and can address all the requirements as the customer prefer.

For example, some organizations prefer to outsource all aspects of administration, logging and monitoring activities of their networks to our SOC team. Others prefer a hybrid model where we provide a fully managed cloud-based SIEM service and they monitor and remediate their own security events. Still, others wish to maintain their own on-premise SIEM system but are looking for our help to either remotely administer their SIEM or monitor alerts.

Pyramid SOC Solution Offers

  • Operational Services
    • Economical 24x7x365 service for continuous monitoring
    • Network monitoring for malicious activity
    • Rapid Security Incident alert and response by experts
    • Threat intelligence
    • Malware Protection
    • Data Loss Prevention (DLP)
    • Security Incident and Event Management (SIEM)
    • Advanced Log and Vulnerability Management
    • Incident Ticketing and workflow management
    • Protection against both perimeter and insider threats
    • Audit Management
    • Document Management system for internal/external use
    • Easy to use Customized Web Portal and Dashboards
  • Governance
    • Create Policies, Procedures, SOC Playbook
    • Assist to establish and train IS organization and IR team
    • Training in incident response
    • Outsourced CISO and Security Operations team
    • Compliance Services
    • Standards / Regulatory requirements like ISO, RBI / IRDA
    • Compliance Compatible Reporting
    • Log Retention Policy
    • Risk Management
    • Access Controls
  • Metrics and Reporting
    • Well defined and meaningful KPIs, KRAs
    • Easy-to-setup and use Search and Alert features
    • Highly configurable report dashboards
  • Forensic investigation and analysis
    • RCA for incidents
    • Data Recovery and analysis
    • Evidence integrity
    • Legal compliance
  • Continuous / Periodic Services
    • Vulnerability Assessments, Penetration testing
    • Web Application Security Testing

Key Features of SOC

  • Built on Scalable Big Data Platform
  • Ability to easily ingest custom application and multiline logs
  • Correlate anything in real time and historical data
  • Readymade Log Shippers
  • Custom shippers for applications
  • Rule and Behavior-based alerts
  • Correlation & Anomaly detection
  • Software Assets Management
  • Vulnerability Management
  • Network Performance Monitoring
  • Cost-Effective