{"id":1651,"date":"2023-09-12T14:49:40","date_gmt":"2023-09-12T14:49:40","guid":{"rendered":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/?page_id=1651"},"modified":"2023-09-12T15:00:50","modified_gmt":"2023-09-12T15:00:50","slug":"soc-technologies","status":"publish","type":"page","link":"http:\/\/wdev2.shorr-kan.net\/clienti\/sk-it-int\/soc-technologies\/","title":{"rendered":"SOC technologies"},"content":{"rendered":"

[vc_row css=”.vc_custom_1694530505036{margin-bottom: 35px !important;}”][vc_column]\n\t\t\t

<\/p>\n\t\t\t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\"\"\nVULNERABILITY MANAGEMENT \n\t\t\t\t\t\t\t<\/rs-layer>SOC technologies \n\t\t\t\t\t\t\t<\/h2>SIEM \n\t\t\t\t\t\t\t<\/rs-layer>Implementation of the most effective technologies in the Security Operation Center so the SOC can intercept attacks against the company, analysing all the data flows and company devices. \n \n\t\t\t\t\t\t\t<\/rs-layer>MONITORING AND LOGGING \n\t\t\t\t\t\t\t<\/rs-layer> \n\t\t\t\t\t\t\t<\/rs-layer>\t\t\t\t\t\t<\/rs-slide>\n\t\t\t\t\t<\/rs-slides>\n\t\t\t\t<\/rs-module>\n\t\t\t\t