[vc_custom_heading text=”Kustodian has built a state of the art..” font_container=”tag:h2|font_size:24px|text_align:left|color:%23000000″ google_fonts=”font_family:Lato%3A100%2C100italic%2C300%2C300italic%2Cregular%2Citalic%2C700%2C700italic%2C900%2C900italic|font_style:700%20bold%20regular%3A700%3Anormal”]
[vc_column_text css_animation=”left-to-right”]

…Security Operations Centre  using a variety of tools, technologies and ISO compliant solutions. Kustodian acquired Carbyne Fibre’s unique state of the art SOC built by expert hackers, offering customers a secure location exporting logs into Kustodian premises for analysis, or Kustodian offers onsite SOC in a box monitoring to ensure your logs stay in your organisation. All equipment is monitored by Kustodian 24/7. All analysts are experts in their fields and monitor security events from Active Directory, UNIX servers, routers, firewalls, IPS, Web and Email appliances, Antivirus and SCADA equipment. The SOC team will then will be responsible for security and SOC incidents. Think SOC’s are expensive, we offer a cut price 24 X7 SOC monitoring service including full licensing and connection costs for $12k a month. We will monitor your websites, firewalls, routers and internal servers and report any incidents into your help desk system. Our  solution includes the following key elements:

[vc_column_text css_animation=”left-to-right”]

• On or offsite customer premises hosted Security Analytics and SIEM. We are experts in Open SOC, Open Source environments to cut down on license fees.
• Facility is ISO27001 compliant, PCIDSS certified and for government customers we have an ISM compliant option
• Real time Cyber Security monitoring to identify, mitigate & respond in real time
• Kustodian Security Services assessment and recommendations for environment.
• Manual External and Internal Penetration testing
• Automated internal and external  vulnerability assessments
• Kustodian SOC incident response, incident classification analysis and remediation recommendations.
• Preparation of potential evidence if it goes to court.
• Creating and maintain a risk register or using customer process.
• SCADA monitoring
• Full detailed documentation for Customer on the SOC and procedures
• Fortnightly reporting.
• Firewall Rule Reviews