IT Security and Cyber Security

With the Security Operations Center (SOCaaS)
IT Security and Cyber Security

Cyber security for companies - protecting your data and information

We all use the Internet every day - privately but of course professionally as well. Wherever many people and machines are in action, opportunities for hackers to penetrate company networks and cause massive damage multiply. Our colleagues at Certified Security Operations Center GmbH, a joint venture between dhpg IT-Services GmbH and TÜV TRUST IT GmbH Unternehmensgruppe TÜV AUSTRIA, offer a wide-ranging spectrum of IT security solutions. CSOC employees are highly qualified analysts with extensive experience in the development of customised IT security solutions and are available around the clock. They focus on the needs of each individual company and design customised security solutions that meet all the company's requirements - to make sure your data is secure. 

Cyber security - what you can expect from us

An all-embracing IT security strategy serves as the cornerstone of digitalisation. As an SOC as a Service (SOCaaS), the Certified Security Operations Center (CSOC) offers a comprehensive range of security solutions that are specially tailored to the individual needs and requirements of SMEs. The IT experts at the CSOC use state-of-the-art technologies to analyse the security of companies, ensuring robust security. The following technologies are used:

In the area of cyber threat management, the CSOC relies on

What specifically does the CSOC support?

A look behind the scenes: This is what it looks like at the Certified Security Operations Center

Our colleagues at the Certified Security Operations Center (CSOC) give their utmost day in day out to ensure the security of your networks and data and ward off hackers - around the clock. In this video, they offer you insight into their daily work and other interesting information.

 

 

Why dhpg?

Standing together for the security of data and information

The SOCaaS concept is based on the notion of community. The more members organise themselves in the Security Operations Center as a Service, the more malware experts are able to register, evaluate and make available to the community. Together, they can start where firewalls and virus protection are no longer effective. The most effective approach against cyber criminals is the organised association of an interest group that pursues the common objective of defending against hackers and benefits from the joint exchange of information and protective measures. 

Icon

A strong team

The CSOC joint venture brings together two strong partners whose service portfolios are a perfect match for the benefit of their joint customers: TÜV TRUST IT as an independent safety inspection company and consultant for information security and dhpg IT-Services GmbH as a competent partner for your confidential and sensitive data. 

Icon

Active monitoring of your IT infrastructure

CSOC analysts monitor the networks of affiliated companies around the clock. In this way, we ensure that cyberattacks are recognised at an early stage and appropriate countermeasures are taken. This offers you and your company protection against a possible outage and the loss of your data and information. You also receive continuous reporting. 

Icon

Data security: top priority

The security of your data is paramount. IT security is part of our DNA as an auditing, legal and tax consultancy firm. And this spirit is also instilled in the analysts at CSOC, who proactively work each and every day to protect affiliated companies from data loss and ultimately financial and reputational damage. 

Your contacts for everything relating to CSOC and IT security solutions

Would you to arrange a personal meeting? We would be glad to arrange an appointment with you - no strings attached - so that we can get to know each other. We look forward to your call or e-mail and to hearing from you.

To the contact persons

FAQs - Questions about IT security solutions and CSOC

What is an SOC and how can it protect against cyberattacks?

An SOC complements IT security and information security in companies. Unlike conventional protective measures, an SOC combines the advantages of technology and manpower. Highly developed monitoring sensors combine with specialised IT experts. SOC sensors monitor the network and IT systems of the connected company in real time and report any suspicious anomalies. IT experts analyse these and can undertake protective measures immediately. This allows a company's infrastructure to be continuously monitored, while connected companies can benefit from the exchange of experience.

Can CSOC also support KRITIS companies?

For critical infrastructures (KRITIS), CSOC offers specialised attack detection systems that meet legal requirements and enable detailed security checks. Any and all security solutions can be used across all industries in sectors such as financial services, healthcare, energy, manufacturing and many more. In addition, CSOC maintains international partnerships and a regular dialogue with leading technology companies in order to identify and effectively combat cross-border cyberthreats. 
 

What does CSOC do when it is hired?

Companies that utilise the support of CSOC do not have to worry about purchasing and regularly maintaining the necessary hardware and software. All the components required are provided as part of the service. Components can be hosted on-premises, as hybrids or in the cloud as required. Services can be customised and scaled to meet individual requirements at any time.

An SzA is required as part of NIS-2. What needs to be done here?

The acronym SzA stands for System for Attack Recognition. A successful SzA is a service that requires coordinated interplay of processes, technology and expertise - this is the only way to fulfil the requirements of the BSI. Technology alone does not satisfy BSI requirements. An attack detection system makes it possible to detect a cyberattack at an early stage and initiate a response immediately. The SzA acts as an alarm system, while its holistic approach means that information from all monitored systems is collated and analysed centrally. 

Where do you notice the most frequent attacks?

The pandemic has promoted ransomware attacks considerably. Attackers highjack social engineering campaigns to capitalise on people's fear of the virus and lure them to prepared websites. Clicking on the link downloads the malicious code. We have also noticed many fake appointment invitations being sent via Outlook. Attackers gain access to an employee's mailbox and then pretend to be a business partner or colleague. The attackers initially act as data collectors and steal the identity of various users. This is achieved by having users download a file in an email attachment or clicking on a malicious link. If attackers are successful, they can take control of the system or the email account, for example to attack online accounts. The aim of this phishing technique is to steal sensitive data such as credit card details, dates of birth and addresses. These are then sold or used directly to empty accounts or purchase goods in the victim's name. Connecting to a SOC can protect against such attempted attacks. 

 Further information can be found at www.csoc.de.
 

CSOC GmbH

At Certified Security Operations Center GmbH, a joint venture of dhpg IT-Services GmbH and TÜV TRUST IT GmbH Unternehmensgruppe TÜV AUSTRIA, we monitor your IT / OT systems for possible cyberattacks, thus protecting you against possible production downtimes, data loss, damage to your image and associated financial risks. We also offer you a vulnerability management system that allows you to keep an eye on your infrastructure at all times. All our services are designed as "managed services" so that you can concentrate on what really matters, i.e. your business model. 

Contact

Get in touch with us

Mail Contact form Telefon +49 228 81000 0
By uploading the YouTube video, you consent to cookies being set by YouTube and Google and to data being transferred to these providers. We process the data in order to be able to analyse access to our YouTube videos or to evaluate the effectiveness of our advertising and ads. YouTube and Google also process the data for their own purposes. In addition, you also agree that your data may be transferred to the USA, although there is a risk in the USA that the US authorities may gain access to your data for surveillance purposes and that you may not have adequate legal protection against such. You will find further information in our Data Protection Policy.
Load YouTube Video
Permalink