Surreal Security’s
security monitoring services keep eyes on
your company’s security gateway (firewall
and IDS) on a 24/7, 365 days a year basis
to protect your operation systems and networks
from the danger of outside attacks such as
computer viruses and worms or cyber terrorism.
* JSOC is a registered
trademark for Little eArth Corporation Co.,
Ltd.
Features
Simple analysis of firewall logs and IDS
alerts may often oversee dangerous unauthorized
accesses which lead to serious incidents.
By using Symantec’s STP (SOC Technology
Platform), we perform a correlation analysis
in certain algorithms on enormous quantities
of firewall logs and IDS alerts, to eliminate
misdetection and summarize unauthorized accesses.
Human analysts analyze any unauthorized events
detected by the STP again and any misdetection
can finally be eliminated. This way, only
the true unauthorized accesses will be reported
to the client. By using the combination of
the STP and human analysts, we have succeeded
in dramatically improving the performance
of unauthorized access detection.
Firewall Monitoring Service
The log from your firewall will be constantly
retrieved, stored in a database, and analyzed
automatically by the special system. Our analysts
then examine the result of the analysis as
well as your system environment comprehensively
and determine the level of importance.
In case any important security event is detected,
you will be contacted immediately.
When combined with the option "Emergency Response
Service", this service will enable you to
avoid attacks, control and prevent the expansion
of damages by simply following the pre-configured
set of rules and promptly implementing the
first responses such as firewall ACL modification
and interface down.
If any interference that affects the firewall
monitoring was detected, we will explain the
situation to you and exert our utmost efforts
for the early resolution of the issue.
IDS Monitoring Service
The log from your N-IDS/H-IDS will be constantly
retrieved, stored in a database, and analyzed
automatically by the special system. Our analysts
then comprehensively examine the result of
the analysis as well as your system environment
and determine the level of importance.
In case any important security event is detected,
you will be contacted immediately.
In this IDS monitoring service, we will perform
a policy tuning to best suit your site. By
conducting the optimal monitoring for your
environment, we can detect unauthorized communication
without fail.
By remotely operating the N-IDS, we can reduce
the cost you bear.
Report Feature
We provide each client with a special web
portal designed in a secured environment.
You can access our web portal securely by
using a token card with a one-time password
and view information on detected unauthorized
events, ticket data (business record between
the audit center and you), and our monthly
reports.
Optional Services
[ Emergency Response Service ]
In case any security event is detected, we
will perform pre-configured procedures as
an emergency response. This service includes
firewall ACL modification, router power disconnection,
and so forth. [ Firewall Operation
Management Service ]
We provide remote controls including firewall
ACL modification, minor version-upgrade of
software and operation monitoring. |