Simplified Security

Managed SIEM/SOC Service

Our Security Information and Event Management (SIEM) + Security Operation Center (SOC) services provide a comprehensive monitoring solution.

What are the benefits?

Improve Productivity

Cloud-based or on-premise and proactively managed SIEM platform complemented with proprietary GCI technology
1

Reduce Risk

24/7 intelligent automated analysis of events with risk-based scoring using over 700 identifiers.
2

Spend Less, Secure More

Fully-fledged SIEM functionality without the costs of purchasing and maintaining self-managed on-site or cloud devices.
3

GCI provides a fully-managed cloud-based or on-site service with full responsibility for the deployment and integration into the client’s environment.

We maintain the service through ongoing fine-tuning of rules-bases and customized rule creation for enhanced threat detection. Events are automatically correlated and analyzed using an industry-leading SIEM platform supplemented by open-source, commercial, and GCI proprietary toolsets for indicators of attack and compromise along each of the stages of the cyber kill-chain.

For organizations requiring log collection and storage, our service collects, classifies, and aggregates events and archives these in our cloud platform or local data center for up to 1 year. Historical data can be made available on request to aid the client’s investigations into incidents.

Schedule an Appointment

Key Technical Components

Log Collection and Storage

  • Log and event collection by GCI Managed Threat Detection Platform
  • Log storage for 1 year
  • Log and event correlatio and aggregation with automated advanced attack analytics
  • Retrieval of historical log data as requested
  • Ongoing tuning of the log collection platform
  • Access to Threat Advisory Services and full vulnerability database
  • Use of proprietary and commercial reputation lists to track communication with potentially
  • malicious IP addresses
  • Use of proprietary and commercial malware analysis databases to identify malware
  • Access to web-based console
  • Access to pre-defined SIEM reports
  • Compliance reporting against supported compliance frameworks
  • Communication details of any compliance violations

Analytics

  • Log and event collection by GCI Managed Threat Detection Platform
  • Log storage for 1 year
  • Log and event correlatio and aggregation with automated advanced attack analytics
  • Retrieval of historical log data as requested
  • Ongoing tuning of the log collection platform
  • Access to Threat Advisory Services and full vulnerability database
  • Use of proprietary and commercial reputation lists to track communication with potentially
  • malicious IP addresses
  • Use of proprietary and commercial malware analysis databases to identify malware
  • Access to web-based console
  • Access to pre-defined SIEM reports
  • Compliance reporting against supported compliance frameworks
  • Communication details of any compliance violations

Alerting & Reporting

  • Log and event collection by GCI Managed Threat Detection Platform
  • Log storage for 1 year
  • Log and event correlatio and aggregation with automated advanced attack analytics
  • Retrieval of historical log data as requested
  • Ongoing tuning of the log collection platform
  • Access to Threat Advisory Services and full vulnerability database
  • Use of proprietary and commercial reputation lists to track communication with potentially
  • malicious IP addresses
  • Use of proprietary and commercial malware analysis databases to identify malware
  • Access to web-based console
  • Access to pre-defined SIEM reports
  • Compliance reporting against supported compliance frameworks
  • Communication details of any compliance violations
  • Log and event collection by GCI Managed Threat Detection Platform
  • Log storage for 1 year
  • Log and event correlatio and aggregation with automated advanced attack analytics
  • Retrieval of historical log data as requested
  • Ongoing tuning of the log collection platform
  • Access to Threat Advisory Services and full vulnerability database
  • Use of proprietary and commercial reputation lists to track communication with potentially
  • malicious IP addresses
  • Use of proprietary and commercial malware analysis databases to identify malware
  • Access to web-based console
  • Access to pre-defined SIEM reports
  • Compliance reporting against supported compliance frameworks
  • Communication details of any compliance violations

Features

Increased Visibility

SLA-based alerting highlights potential abnormalities or indicators of attack.

Improved Compliance

Internal or regulatory compliance policies auditing requirements fulfilled through 365-day storage of logs

Latest Tech

GCI Cyber Defence platform is at the forefront of technology using the latest detection techniques including machine learning.

Discover What GCI Can Do for You.