Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the complianz-gdpr domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/microsecure/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/microsecure/public_html/wp-includes/functions.php:6114) in /home/microsecure/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":25943,"date":"2022-06-15T12:45:01","date_gmt":"2022-06-15T16:45:01","guid":{"rendered":"https:\/\/www.microsecure.com\/?page_id=25943"},"modified":"2023-08-08T22:24:20","modified_gmt":"2023-08-09T02:24:20","slug":"surveillance-system-and-intrusion-detection","status":"publish","type":"page","link":"https:\/\/www.microsecure.com\/en\/surveillance-system-and-intrusion-detection\/","title":{"rendered":"Surveillance system and intrusion detection"},"content":{"rendered":"

[et_pb_section fb_built=”1″ next_background_color=”#f7f7f7″ _builder_version=”4.17.4″ _module_preset=”default” background_color=”#1B417C” use_background_color_gradient=”on” background_color_gradient_direction=”45deg” background_color_gradient_stops=”#1B417C 0%|#134EEE 100%” background_color_gradient_start=”#1B417C” background_color_gradient_end=”#134EEE” background_image=”https:\/\/www.microsecure.com\/wp-content\/uploads\/2018\/09\/svg-stripes.svg” background_size=”contain” background_position=”top_left” custom_padding=”100px||100px||false|false” bottom_divider_style=”wave2″ bottom_divider_height=”66px” bottom_divider_repeat=”0x” background_last_edited=”on|desktop” global_colors_info=”{}”][et_pb_row column_structure=”2_3,1_3″ _builder_version=”4.16.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”2_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” text_text_color=”#ffffff” text_font_size=”18px” text_line_height=”1.5em” link_font=”|600|||||||” link_text_color=”#FFFFFF” header_font=”|700|||||||” header_text_color=”#ffffff” header_font_size=”34px” header_line_height=”1.3em” header_2_font=”|600|||||||” header_2_text_color=”#FFFFFF” locked=”off” global_colors_info=”{}”]<\/p>\n

SIEM<\/h1>\n

Surveillance system and intrusion detection<\/h2>\n

FortiSIEM technology and Microsoft Azure Sentinel[\/et_pb_text][et_pb_button button_url=”\/en\/contact-us\/” button_text=”Talk to an expert” _builder_version=”4.17.4″ _module_preset=”default” custom_button=”on” button_text_size=”18px” button_text_color=”#FFFFFF” button_bg_color=”#E02B20″ button_border_width=”0px” button_border_radius=”0px” button_letter_spacing=”1px” button_font=”|700|||||||” global_colors_info=”{}” button_bg_color__hover_enabled=”on|hover” button_bg_color__hover=”#1b407c” button_bg_enable_color__hover=”on”][\/et_pb_button][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”https:\/\/www.microsecure.com\/wp-content\/uploads\/2022\/06\/Untitled-design-7-1.png” title_text=”Untitled design-7″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16.1″ _module_preset=”default” background_color=”#f7f7f7″ use_background_color_gradient=”on” background_color_gradient_stops=”#f7f7f7 0%|#ffffff 100%” global_colors_info=”{}”][et_pb_row use_custom_gutter=”on” gutter_width=”1″ _builder_version=”4.17.4″ _module_preset=”default” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_accordion open_toggle_text_color=”#e02b20″ open_toggle_background_color=”#FFFFFF” closed_toggle_background_color=”#FFFFFF” icon_color=”#1B417C” _builder_version=”4.17.4″ _module_preset=”default” toggle_text_color=”#1b417c” toggle_level=”h2″ toggle_font=”|600|||||||” toggle_font_size=”20px” global_colors_info=”{}”][et_pb_accordion_item title=”Cybersecurity: a vast perimeter to defend, played on multiple chessboards.” open=”on” _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”]To always be ahead of IT threats, we constantly monitor event logs and the performance of your IT infrastructure. Our SOC (Security Operation Center) classifies these events, analyzes them, and initiates remediation processes according to the level of priority.
\nOur solution adapts and connects to most technologies on the market to ensure the collection of maximum information and the protection of all your assets.
\nThe collectors are installed in your systems, collect the information, and send it to our SIEM which then takes care of the analysis, correlation, and alerts.[\/et_pb_accordion_item][et_pb_accordion_item title=”What does SIEM mean?” _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}” open=”off”]It is an acronym of the English expression “Security Information & Event management” whose French version is GIES (Gestion des Informations et des Ev\u00e9nements de S\u00e9curit\u00e9), an artificial intelligence (AI) system using predefined rules or statistical correlation to determine whether there are links between different event logs to detect unusual or potentially dangerous network activities.[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.17.4″ _module_preset=”default” custom_padding=”||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” text_font_size=”16px” header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#1B417C” custom_padding=”||||false|false” global_colors_info=”{}”]<\/p>\n

Advantage <\/h2>\n

As an organization, you should be able to continue to be at your best today and build your future with peace of mind. We take care of the cyber threat and its harmful consequences for the conduct of your business.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_2″ _builder_version=”4.17.4″ _module_preset=”default” custom_padding=”30px||30px||false|false” box_shadow_style=”preset1″ box_shadow_color=”rgba(0,0,0,0.1)” global_colors_info=”{}”][et_pb_icon font_icon=”||divi||400″ icon_color=”#1b417c” icon_width=”40px” _builder_version=”4.17.4″ _module_preset=”default” background_color=”#f7f7f7″ custom_padding=”20px|20px|20px|20px|false|false” border_radii=”on|50px|50px|50px|50px” border_width_all=”1px” border_color_all=”#1B417C” global_colors_info=”{}”][\/et_pb_icon][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” header_3_font=”|700|||||||” header_3_text_align=”center” header_3_text_color=”#FFFFFF” background_color=”#1B417C” custom_padding=”10px||||false|false” global_colors_info=”{}”]<\/p>\n

The strength of our service <\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” text_font_size=”16px” custom_padding=”|30px||30px|false|false” global_colors_info=”{}”]Whether it is our internal algorithms developed to investigate the Dark Web or those carefully selected by our partners, cyber intelligence remains at the heart of our cyber security practice.[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.17.4″ _module_preset=”default” custom_padding=”30px||30px||false|false” box_shadow_style=”preset1″ box_shadow_color=”rgba(0,0,0,0.1)” global_colors_info=”{}”][et_pb_icon font_icon=”||fa||900″ icon_color=”#1b417c” icon_width=”40px” _builder_version=”4.17.4″ _module_preset=”default” background_color=”#f7f7f7″ custom_padding=”20px|15px|20px|15px|false|false” border_radii=”on|50px|50px|50px|50px” border_width_all=”1px” border_color_all=”#1B417C” global_colors_info=”{}”][\/et_pb_icon][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” header_3_font=”|700|||||||” header_3_text_align=”center” header_3_text_color=”#FFFFFF” background_color=”#1B417C” custom_padding=”10px||||false|false” global_colors_info=”{}”]<\/p>\n

The strength of our team <\/h3>\n

[\/et_pb_text][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” text_font_size=”16px” custom_padding=”|30px||30px|false|false” locked=”off” global_colors_info=”{}”]Our extended in-house team is made up of over 50 top experts who globally support multiple technologies and hold multiple certifications.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.17.4″ _module_preset=”default” background_color=”#E02B20″ custom_padding=”10px||10px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.17.4″ _module_preset=”default” custom_padding=”40px||||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.17.4″ _module_preset=”default” text_text_color=”rgba(255,255,255,0.52)” text_font_size=”17px” link_text_color=”#E02B20″ header_2_font=”|700|||||||” header_2_text_align=”center” header_2_text_color=”#FFFFFF” header_2_font_size=”30px” header_3_font_size=”28px” header_3_line_height=”1.2em” text_orientation=”center” locked=”off” global_colors_info=”{}”]<\/p>\n

CONSOLIDATE \/ UNDERSTAND \/ REMEDY <\/h2>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_row column_structure=”1_5,3_5,1_5″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”1_5″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]IT threat detection service[\/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]Incident Response[\/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]Monitoring suspicious activity on workstations, servers, and network equipment[\/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]Compliance reports[\/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]Monitoring your information on the Dark Web continuously[\/et_pb_blurb][et_pb_blurb use_icon=”on” font_icon=”$||divi||400″ icon_color=”#1B417C” icon_placement=”left” _builder_version=”4.17.4″ _module_preset=”default” body_font_size=”16px” body_line_height=”1.8em” custom_margin=”||10px||false|false” global_colors_info=”{}”]Monthly meeting with a security expert[\/et_pb_blurb][et_pb_image src=”https:\/\/www.microsecure.com\/wp-content\/uploads\/2022\/06\/Fortinet-logo.png” title_text=”Fortinet logo” _builder_version=”4.17.4″ _module_preset=”default” max_width=”300px” module_alignment=”center” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_5″ _builder_version=”4.17.4″ _module_preset=”default” global_colors_info=”{}”][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”on|on|off” _builder_version=”4.16.1″ _module_preset=”default” background_color=”#f7f7f7″ custom_padding=”80px||80px||false|false” global_colors_info=”{}”][et_pb_row _builder_version=”4.16.1″ _module_preset=”default” background_color=”#FFFFFF” width=”95%” custom_padding=”50px|30px|50px|30px|false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16.1″ _module_preset=”default” global_colors_info=”{}”][et_pb_text _builder_version=”4.16.1″ _module_preset=”default” header_3_font=”|700|||||||” header_3_font_size=”28px” global_colors_info=”{}”]<\/p>\n

SIEM Managed Security Service<\/h3>\n

Comparison of managed SOC \/ SIEM services[\/et_pb_text][et_pb_code _builder_version=”4.17.4″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]<\/p>\n