Your bolt-on team of IT security analysts
Get the keys to a customizable, fully staffed and experienced SOC. The A1 Group SOC team of analysts ingests all of your critical logs and data and highlights current threats in real-time – and help you to recover your systems after an incident.
Continuous observability monitoring of your IT infrastructure to detect false-positives, prevent false-negatives and immediately respond to threats.
Real-time monitoring by our trained security analysts with comprehensive information and recommendations to patch all identified vulnerabilities.
Analyze, evaluate, and minimize your current risks with access to your data at any level, including a personalized Risk & Security Cockpit and customized, easy-to-understand reports.
Have a direct line to the A1 Security Intelligence team via our integrated messaging system.
Our security experts help to defend and mitigate attacks, and closely work together with your IT team to recover all your systems and data according to your incident response plan.
Our SOC team is established, well-trained and experienced for years – and ready to start working for you today.
We work based on industry-standard observability platforms, as well as incident, event management and automated response systems.
Adapt our scope of services and processes individually to your business’s specific requirements and challenges.
We can rely on the resources, know-how, and infrastructure of A1 Telekom Austria Group – so can you.
The first step is a security check to evaluate the existing IT and OT infrastructure. The goal is an initial maturity analysis and assessment based on predefined metrics in order to identify pain points and blind spots.
In the event of a security incident, the first responder becomes active and begins with an initial investigation based on the A1 Threat Intelligence Platform. Log files are analysed and known IOCs are searched.
In this phase, software is deployed for in-depth analysis by the IR expert. By means of monitoring, threat hunting and remediation, an attempt is made to limit and solve the incident.
If necessary, and in close coordination with the customer, the customer's infrastructure is searched and cleansed of attackers with global resources and on the basis of Mandiant's globally leading incident response specialists.