On December 14, 2017, CMC Technology Corporation officially opened the CMC SOC Network Security Operations Center.
The SOC is defined as a network security center that monitors, detects, quarantines, handles incidents and is responsible for security levels. safety of the entire organization's information system with surveillance frequency, operating 24/7.


Components of CMC SOC



All technology solutions used in monitoring, detecting, analyzing, warning and archiving at CMC SOC network security management center are staffed by CMC SOC network security management center. develop and master.
SERVICES OF CMC SOC
SUPERVISION SERVICES
CMC Security Monitoring Service
We are entering a period in which information technology has played a major role in the activities of organizations and businesses. Along with that, the threat of information security is growing, becoming a painful problem, threatening to leak information as well as disrupting the operation of the organization, causing damages. great harm ...


Incident handling service
CMC Incident Response Service
Information Security Monitoring Service of CMC Cyber Security is provided by CMC SOC Network Security Operations Center. With the integration of artificial intelligence, Machine Learning and Automation technology and other advanced security solutions, CMC Cyber Security will ensure the network system and customer applications and services will followed…
HUNTING SERVICE
CMC Threat Hunting Service
The security industry in the world is in a fierce battle against cybercriminals with increasingly sophisticated and sophisticated forms of exploitation. However, according to recent studies, traditional security solutions can almost only identify known threats, while unknown threats are often difficult….


CMC Threats Intelligence Services
The security industry in the world is in a fierce battle against cyber attacks that are increasing in number, speed and complexity. This reality requires a new approach to preventing cyber threats. According to recent studies, traditional security solutions can only identify known threats….