STRATEGIC BUSINESS PARTNERS

Platin Bilişim has cooperations with the strongest and leader brands. Our target is not only make a difference on our rivals via our certificated and powerful engineer staff but also; providing IT security products and services for our customers from end to end.

IBM SOC Proactive Security

SOC; It is a center where security events and their status are continuously monitored, analyzed and notified to the customer.

Unlike the traditional SOC approach, Platin Bilişim interprets the SOC with its predictive security approach, threat hunting and preventing, monitoring, deep analysis and qualified notification services.

Platin Bilişim has adopted a “SecOps” structure with Red Team, Blue Team, Purple Team and general security engineering teams (Infrastructure-Data-Application-Network-etc.) within the scope of SOC services. At this point, the tracking notification services are provided by our Blue Team. The offensive services such as Penetration Test, Periodic Infiltration, Vulnerability Management, Cyber Intelligence and Deception are provided by the Red Team and services such Maturity and Visibility Analysis, Rule Consultancy and Visibility Reporting are provided by Purple Team.

Our SOC teams can react faster by working in coordination with our Holistic Security team and reporting the actions that need to be taken on the devices used within the SOC structure. At the point of our SecOps structuring, our SOC services differ under certain criteria. At this point, services are commissioned in a short time with visibility, shadow monitoring and fine-tuning studies during the SOC project periods in institutions. The fact that log outage tracking, notification with sustainable L1 service and analysis of global attack campaigns are provided specifically for organizations with retrospective analysis and a minimum of 4 reports per month, makes our Fusion SOC service unique and different in the SecOps structure. 

Our SOC works with security analysts / engineers / offensive-defensive teams / incident response teams focusing on cybersecurity 24 hours a day, 7 days a week, and provides a coordinated work to carry out threat analysis, identify, examine, and impact analysis of security threats that may or may occur. In line with these studies, taking measures to ensure the necessary notifications and incident management, compliance, discovery of developing cyber attacks and attack types, technology-specific risk analysis, SOC rule creation, cyber intelligence service and vulnerability analysis, continuous threat hunting, post-attack forensics (forensics) ) to support institutions at many points such as doing their work. In this sense, value-added services are provided to institutions for the detection, resolution and prevention of cyber incidents.