{"id":26396,"date":"2022-01-11T12:37:27","date_gmt":"2022-01-11T09:37:27","guid":{"rendered":"https:\/\/cypro.bg\/?page_id=26396"},"modified":"2023-09-21T13:25:16","modified_gmt":"2023-09-21T10:25:16","slug":"soc-aas","status":"publish","type":"page","link":"https:\/\/cypro.bg\/en\/soc-aas\/","title":{"rendered":"SOC-as-a-service"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Header&#8221; module_id=&#8221;soc-aas__block-1&#8243; _builder_version=&#8221;4.10.4&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#004183&#8243; background_color_gradient_end=&#8221;#001f4c&#8221; background_color_gradient_type=&#8221;radial&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-18.png&#8221; parallax=&#8221;on&#8221; overflow-x=&#8221;hidden&#8221; overflow-y=&#8221;hidden&#8221; custom_padding=&#8221;6vw||82px|||&#8221; bottom_divider_style=&#8221;curve2&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.10.4&#8243; z_index=&#8221;1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.1&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;Overpass|900|||||||&#8221; header_font_size=&#8221;69px&#8221; background_layout=&#8221;dark&#8221; header_font_size_tablet=&#8221;54px&#8221; header_font_size_phone=&#8221;32px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Security Operations<\/h1>\n<h1>Center as a Service<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;19px&#8221; text_line_height=&#8221;1.8em&#8221; background_layout=&#8221;dark&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">SOC-as-a-Service (SOCaaS) is a subscription-based managed threat detection and response model that employs people, processes and technology to monitor breaches and improve an organization&#8217;s security while preventing, detecting, analyzing and responding<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">of cyber security incidents.<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;Talk with an expert&#8221; _builder_version=&#8221;4.10.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#00b4ff&#8221; button_bg_color=&#8221;rgba(0,0,0,0)&#8221; button_border_width=&#8221;2px&#8221; button_border_color=&#8221;#00b4ff&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;12px|24px|12px|24px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;About&#8221; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25.3&#8243; max_width=&#8221;800px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;48px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;|||||&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Why having SOC is key?<\/h2>\n<p><span>A security operations center can help mitigate the effects of a data breach, but its business benefits are far greater.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Security&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-18.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>The purpose of SOC is to gain a complete view of the threats facing the business, including not only the different types of endpoints, servers and software, but also third-party services and traffic flowing between these assets.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Prevention&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-36.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">All actions taken to make successful attacks more difficult, including regularly maintaining and updating existing systems;<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">updating firewall policies;<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">patching vulnerabilities;<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">whitelisting, blacklisting and application protection.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;24\/7 Monitoring&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-14.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">SOC tools scan the network 24\/7 to flag any suspicious activity.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Round-the-clock monitoring allows the team to be immediately notified of emerging threats, giving them the best chance to prevent or mitigate damage.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Alert Management&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-icon-2.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>When monitoring tools issue alerts, it&#8217;s the SOC&#8217;s responsibility to scrutinize each one, reject any false ones, and determine how aggressive the actual threats are and what they might be targeting.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Threat response&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-20.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">The SOC acts as the first force, performing actions such as shutting down or isolating endpoints, terminating harmful processes (or preventing them from running), deleting files, and more.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">The goal is as little impact on business continuity as possible.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Recovery&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-36.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">After an incident, the SOC will work to restore systems and lost or compromised data.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">This can include deleting and restarting endpoints, reconfiguring systems or, in the case of ransomware attacks, using backups.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">When successful, this step will return the network to the state it was in before the incident.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Improving Security&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-28.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Cybercriminals are constantly improving their tools and tactics \u2013 and to stay one step ahead, a SOC must continually implement improvements.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">This can also include practices like red-teaming and purple-teaming.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Compliance&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-icon-15.png&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Overpass|800|||||||&#8221; header_text_align=&#8221;center&#8221; header_font_size=&#8221;20px&#8221; body_text_align=&#8221;justify&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Many SOC processes are guided by established best practices, but some are driven by compliance requirements.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">The SOC is responsible for regularly auditing systems to ensure compliance with such regulations as may be required by the organization, by industry or by governing bodies.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Examples of these regulations include GDPR and ISO.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; prev_background_color=&#8221;#ffffff&#8221; next_background_color=&#8221;#ffffff&#8221; admin_label=&#8221;Feature&#8221; module_id=&#8221;soc-aas__block-3&#8243; _builder_version=&#8221;4.10.4&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00ffd8&#8243; background_color_gradient_end=&#8221;#0029e2&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_enable_image=&#8221;off&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_center&#8221; custom_padding=&#8221;125px||172px|||&#8221; custom_padding_tablet=&#8221;||24vw&#8221; custom_padding_phone=&#8221;&#8221; top_divider_style=&#8221;curve2&#8243; top_divider_height=&#8221;5vw&#8221; top_divider_flip=&#8221;horizontal&#8221; bottom_divider_style=&#8221;curve2&#8243; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-09.png&#8221; background_enable_image_tablet=&#8221;on&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25.3&#8243; max_width=&#8221;800px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25.3&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;||||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;45px&#8221; header_2_line_height=&#8221;1.1em&#8221; header_3_font=&#8221;Overpass|600|||||||&#8221; header_3_text_color=&#8221;#00b4ff&#8221; header_3_font_size=&#8221;30px&#8221; header_3_line_height=&#8221;1.2em&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;left&#8221; custom_margin=&#8221;||&#8221; custom_padding=&#8221;|||||&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; header_3_font_tablet=&#8221;&#8221; header_3_font_phone=&#8221;Overpass|700|||||||&#8221; header_3_font_last_edited=&#8221;on|phone&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;18px&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 id=\"Beneftis\">SOC-as-a-Service Benefits<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png&#8221; title_text=&#8221;cyber-security-10&#8243; align=&#8221;center&#8221; module_class=&#8221;block-img__main&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;24&#215;7 Security Monitoring&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/1X_Hosting_Small-Icon_02.png&#8221; icon_placement=&#8221;left&#8221; module_id=&#8221;mobile-list__images&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;20px&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>Across local networks, public cloud environments, SaaS applications and endpoints.<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Lower Cyberrisk&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/11\/1X_Hosting_Small-Icon_19.png&#8221; icon_placement=&#8221;left&#8221; module_id=&#8221;mobile-list__images&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|600|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;20px&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>SOC-as-a-Service reduces the risk of a breach and the occurrence of unforeseen costs (legal fees, regulatory fines, customer service costs, etc.)<\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Cost-effective&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-illustrated-icons-05.png&#8221; icon_placement=&#8221;left&#8221; module_id=&#8221;mobile-list__images&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;20px&#8221; body_font=&#8221;||||||||&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">Companies pay for SOC-as-a-service as a monthly operating expense.<\/span><\/span><span> <\/span><span jsaction=\"agoMJf:PFBcW;MZfLnc:P7O7bd;nt4Alf:pvnm0e,pfE8Hb,PFBcW;B01qod:dJXsye;H1e5u:iXtTIf;lYIUJf:hij5Wb;bmeZHc:iURhpf;Oxj3Xe:qAKMYb,yaf12d\" jsname=\"txFAF\" class=\"jCAhz ChMk0b\" jscontroller=\"Gn4SMb\"><span class=\"ryNqvb\" jsaction=\"click:E6Tfl,GFf3ac,tMZCfe; contextmenu:Nqw7Te,QP7LD; mouseout:Nqw7Te; mouseover:E6Tfl,c2aHje\" jsname=\"W297wb\">For most businesses, this is more cost-effective than the capital and operating costs of setting up and staffing on-site.<\/span><\/span><\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=&#8221;Tech Support&#8221; image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/11\/1X_Hosting_Small-Icon_08.png&#8221; icon_placement=&#8221;left&#8221; module_id=&#8221;mobile-list__images&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;20px&#8221; body_text_color=&#8221;#FFFFFF&#8221; body_font_size=&#8221;15px&#8221; body_line_height=&#8221;1.6em&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p><span>Support to optimize protection, detection and response capabilities through continuous assessment and analysis, including policy guidance and security strategies.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Footer&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.10.4&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#3122b2&#8243; background_color_gradient_end=&#8221;#00ffd8&#8243; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-17.png&#8221; z_index=&#8221;10&#8243; overflow-x=&#8221;visible&#8221; overflow-y=&#8221;visible&#8221; custom_padding=&#8221;27px||7vw|||&#8221; saved_tabs=&#8221;all&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; make_equal=&#8221;on&#8221; module_class=&#8221;section__gdpr__contact&#8221; _builder_version=&#8221;4.10.4&#8243; background_color=&#8221;#ffffff&#8221; custom_margin=&#8221;-146px|auto|-2px|auto||&#8221; custom_padding=&#8221;0px||0px||true&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; box_shadow_style=&#8221;preset1&#8243; box_shadow_vertical=&#8221;40px&#8221; box_shadow_blur=&#8221;60px&#8221; box_shadow_spread=&#8221;-8px&#8221; box_shadow_color=&#8221;rgba(10,45,97,0.48)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;3.25.3&#8243; custom_padding=&#8221;60px|40px|60px|40px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0421\u0432\u044a\u0440\u0436\u0435\u0442\u0435 \u0441\u0435 \u0441 \u043d\u0430\u0441<\/h1>\n<p>[\/et_pb_text][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%264%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; header_font=&#8221;Overpass|900|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"tel:02 491 83 12\">02 491 83 12<\/a>, <a href=\"tel:+359 888 431 536\">+359 888 431 536<\/a><\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%249%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5>\u0433\u0440. \u0421\u043e\u0444\u0438\u044f, \u0443\u043b. \u0412\u0438\u0441\u043a\u044f\u0440 \u043f\u043b\u0430\u043d\u0438\u043d\u0430 15-17<\/h5>\n<p>[\/et_pb_blurb][et_pb_blurb use_icon=&#8221;on&#8221; font_icon=&#8221;%%238%%&#8221; icon_color=&#8221;#006ac1&#8243; icon_placement=&#8221;left&#8221; use_icon_font_size=&#8221;on&#8221; icon_font_size=&#8221;24px&#8221; _builder_version=&#8221;4.10.4&#8243; _module_preset=&#8221;default&#8221; header_level=&#8221;h5&#8243; header_font=&#8221;Overpass|700|||||||&#8221; header_line_height=&#8221;1.4em&#8221; body_font=&#8221;Overpass|300|||||||&#8221; body_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h5><a href=\"mailto:office@cypro.bg\">office@cypro.bg<\/a><\/h5>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;3.25.3&#8243; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#00f6ff&#8221; background_color_gradient_end=&#8221;#00ffbf&#8221; background_color_gradient_type=&#8221;radial&#8221; background_color_gradient_direction_radial=&#8221;top right&#8221; background_image=&#8221;https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/cyber-security-010-1.png&#8221; background_size=&#8221;contain&#8221; background_position=&#8221;bottom_left&#8221; transform_translate_linked=&#8221;off&#8221; custom_padding=&#8221;60px|40px|60px|20%|true&#8221; custom_padding_tablet=&#8221;80px|||40px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; background_last_edited=&#8221;on|desktop&#8221; background_image_tablet=&#8221;http:\/\/zaib.sandbox.etdevs.com\/divi\/wp-content\/uploads\/sites\/2\/2019\/06\/cyber-security-11.png&#8221; background_enable_image_tablet=&#8221;on&#8221; background_position_tablet=&#8221;top_left&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;||||||||&#8221; header_font=&#8221;|800|||||||&#8221; header_2_font=&#8221;Overpass|900|||||||&#8221; header_2_font_size=&#8221;56px&#8221; header_2_line_height=&#8221;1.1em&#8221; text_orientation=&#8221;center&#8221; header_2_font_size_tablet=&#8221;38px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; text_text_align=&#8221;center&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>\u0417\u0430\u043f\u0430\u0437\u0435\u0442\u0435 \u0447\u0430\u0441 \u0437\u0430 \u0441\u0440\u0435\u0449\u0430<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.10.4&#8243; text_font=&#8221;Overpass|300|||||||&#8221; text_text_color=&#8221;#0a2d61&#8243; text_font_size=&#8221;17px&#8221; text_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; text_font_size_tablet=&#8221;&#8221; text_font_size_phone=&#8221;14px&#8221; text_font_size_last_edited=&#8221;on|desktop&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>\u0413\u043e\u0432\u043e\u0440\u0435\u0442\u0435 \u0441 \u0435\u043a\u0441\u043f\u0435\u0440\u0442, \u0437\u0430 \u0434\u0430 \u0437\u0430\u043f\u043e\u0447\u043d\u0435\u0442\u0435 \u0434\u043d\u0435\u0441!<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjI1NDE5In19@&#8221; button_text=&#8221;\u0417\u0430\u043f\u0430\u0437\u0438 \u0447\u0430\u0441&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.10.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;14px&#8221; button_text_color=&#8221;#ffffff&#8221; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#003070&#8243; button_bg_color_gradient_end=&#8221;#001f4c&#8221; button_bg_color_gradient_type=&#8221;radial&#8221; button_bg_color_gradient_direction=&#8221;140deg&#8221; button_bg_color_gradient_direction_radial=&#8221;top right&#8221; button_border_width=&#8221;0px&#8221; button_border_radius=&#8221;100px&#8221; button_font=&#8221;Overpass|900||on|||||&#8221; button_use_icon=&#8221;off&#8221; custom_padding=&#8221;20px|30px|20px|30px|true|true&#8221; box_shadow_style=&#8221;preset3&#8243; box_shadow_vertical=&#8221;0px&#8221; box_shadow_blur=&#8221;0px&#8221; box_shadow_spread=&#8221;-10px&#8221; box_shadow_color=&#8221;rgba(25,114,255,0.4)&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; box_shadow_color__hover=&#8221;#2585b2&#8243; box_shadow_blur__hover_enabled=&#8221;on&#8221; box_shadow_blur__hover=&#8221;40px&#8221; box_shadow_vertical__hover_enabled=&#8221;on&#8221; box_shadow_vertical__hover=&#8221;10px&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Operations Center as a ServiceSOC-as-a-Service (SOCaaS) is a subscription-based managed threat detection and response model that employs people, processes and technology to monitor breaches and improve an organization&#8217;s security while preventing, detecting, analyzing and responding of cyber security incidents. &nbsp;Why having SOC is key? A security operations center can help mitigate the effects of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":332,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-26396","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.6 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SOC-as-a-service - CyPro Bulgaria Ltd.<\/title>\n<meta name=\"description\" content=\"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cypro.bg\/en\/soc-aas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC-as-a-service\" \/>\n<meta property=\"og:description\" content=\"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cypro.bg\/en\/soc-aas\/\" \/>\n<meta property=\"og:site_name\" content=\"CyPro Bulgaria Ltd.\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-21T10:25:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/\",\"url\":\"https:\/\/cypro.bg\/en\/soc-aas\/\",\"name\":\"SOC-as-a-service - CyPro Bulgaria Ltd.\",\"isPartOf\":{\"@id\":\"https:\/\/cypro.bg\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"datePublished\":\"2022-01-11T09:37:27+00:00\",\"dateModified\":\"2023-09-21T10:25:16+00:00\",\"description\":\"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438\",\"breadcrumb\":{\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cypro.bg\/en\/soc-aas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png\",\"width\":1000,\"height\":1000,\"caption\":\"penetration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cypro.bg\/en\/soc-aas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u041d\u0430\u0447\u0430\u043b\u043e\",\"item\":\"https:\/\/cypro.bg\/en\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC-as-a-service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cypro.bg\/en\/#website\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"name\":\"CyPro Bulgaria Ltd.\",\"description\":\"Tomorrow's protection available today\",\"publisher\":{\"@id\":\"https:\/\/cypro.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cypro.bg\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cypro.bg\/en\/#organization\",\"name\":\"CyPro Bulgaria Ltd.\",\"url\":\"https:\/\/cypro.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"contentUrl\":\"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png\",\"width\":300,\"height\":300,\"caption\":\"CyPro Bulgaria Ltd.\"},\"image\":{\"@id\":\"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SOC-as-a-service - CyPro Bulgaria Ltd.","description":"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cypro.bg\/en\/soc-aas\/","og_locale":"en_US","og_type":"article","og_title":"SOC-as-a-service","og_description":"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438","og_url":"https:\/\/cypro.bg\/en\/soc-aas\/","og_site_name":"CyPro Bulgaria Ltd.","article_modified_time":"2023-09-21T10:25:16+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cypro.bg\/en\/soc-aas\/","url":"https:\/\/cypro.bg\/en\/soc-aas\/","name":"SOC-as-a-service - CyPro Bulgaria Ltd.","isPartOf":{"@id":"https:\/\/cypro.bg\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage"},"image":{"@id":"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage"},"thumbnailUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","datePublished":"2022-01-11T09:37:27+00:00","dateModified":"2023-09-21T10:25:16+00:00","description":"SOC-as-a-Service (SOCaaS) \u0435 \u0431\u0430\u0437\u0438\u0440\u0430\u043d \u043d\u0430 \u0430\u0431\u043e\u043d\u0430\u043c\u0435\u043d\u0442 \u043c\u043e\u0434\u0435\u043b \u0437\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u0440\u0438\u0432\u0430\u043d\u0435 \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u0430\u043d\u0435 \u043d\u0430 \u0437\u0430\u043f\u043b\u0430\u0445\u0438 \u0437\u0430 \u043d\u0435\u043f\u0440\u0435\u043a\u044a\u0441\u043d\u0430\u0442\u043e \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u0438","breadcrumb":{"@id":"https:\/\/cypro.bg\/en\/soc-aas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cypro.bg\/en\/soc-aas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/soc-aas\/#primaryimage","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/08\/cyber-security-10.png","width":1000,"height":1000,"caption":"penetration"},{"@type":"BreadcrumbList","@id":"https:\/\/cypro.bg\/en\/soc-aas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u041d\u0430\u0447\u0430\u043b\u043e","item":"https:\/\/cypro.bg\/en\/home\/"},{"@type":"ListItem","position":2,"name":"SOC-as-a-service"}]},{"@type":"WebSite","@id":"https:\/\/cypro.bg\/en\/#website","url":"https:\/\/cypro.bg\/en\/","name":"CyPro Bulgaria Ltd.","description":"Tomorrow's protection available today","publisher":{"@id":"https:\/\/cypro.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cypro.bg\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cypro.bg\/en\/#organization","name":"CyPro Bulgaria Ltd.","url":"https:\/\/cypro.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","contentUrl":"https:\/\/cypro.bg\/wp-content\/uploads\/2021\/10\/MicrosoftTeams-image-19.png","width":300,"height":300,"caption":"CyPro Bulgaria Ltd."},"image":{"@id":"https:\/\/cypro.bg\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/26396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/comments?post=26396"}],"version-history":[{"count":7,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/26396\/revisions"}],"predecessor-version":[{"id":27237,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/pages\/26396\/revisions\/27237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media\/332"}],"wp:attachment":[{"href":"https:\/\/cypro.bg\/en\/wp-json\/wp\/v2\/media?parent=26396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}