Surreal Security | Security Monitoring Services
To the Next Stage... by Security Surreal Security Corporation Surreal Security
home About Us Our Services Careers Contacts
Our Services
Services
Consulting
Monitoring

Surreal Security’s security monitoring services keep eyes on your company’s security gateway (firewall and IDS) on a 24/7, 365 days a year basis to protect your operation systems and networks from the danger of outside attacks such as computer viruses and worms or cyber terrorism.

JSOC Basic Concept

* JSOC is a registered trademark for Little eArth Corporation Co., Ltd.

Features

Simple analysis of firewall logs and IDS alerts may often oversee dangerous unauthorized accesses which lead to serious incidents.
By using Symantec’s STP (SOC Technology Platform), we perform a correlation analysis in certain algorithms on enormous quantities of firewall logs and IDS alerts, to eliminate misdetection and summarize unauthorized accesses. Human analysts analyze any unauthorized events detected by the STP again and any misdetection can finally be eliminated. This way, only the true unauthorized accesses will be reported to the client. By using the combination of the STP and human analysts, we have succeeded in dramatically improving the performance of unauthorized access detection.

Firewall Monitoring Service

The log from your firewall will be constantly retrieved, stored in a database, and analyzed automatically by the special system. Our analysts then examine the result of the analysis as well as your system environment comprehensively and determine the level of importance.
In case any important security event is detected, you will be contacted immediately.
When combined with the option "Emergency Response Service", this service will enable you to avoid attacks, control and prevent the expansion of damages by simply following the pre-configured set of rules and promptly implementing the first responses such as firewall ACL modification and interface down.
If any interference that affects the firewall monitoring was detected, we will explain the situation to you and exert our utmost efforts for the early resolution of the issue.

IDS Monitoring Service

The log from your N-IDS/H-IDS will be constantly retrieved, stored in a database, and analyzed automatically by the special system. Our analysts then comprehensively examine the result of the analysis as well as your system environment and determine the level of importance.
In case any important security event is detected, you will be contacted immediately.
In this IDS monitoring service, we will perform a policy tuning to best suit your site. By conducting the optimal monitoring for your environment, we can detect unauthorized communication without fail.
By remotely operating the N-IDS, we can reduce the cost you bear.

Report Feature

We provide each client with a special web portal designed in a secured environment.
You can access our web portal securely by using a token card with a one-time password and view information on detected unauthorized events, ticket data (business record between the audit center and you), and our monthly reports.

Optional Services

[ Emergency Response Service ]
In case any security event is detected, we will perform pre-configured procedures as an emergency response. This service includes firewall ACL modification, router power disconnection, and so forth.

[ Firewall Operation Management Service ]
We provide remote controls including firewall ACL modification, minor version-upgrade of software and operation monitoring.