Stay one step ahead of cyber attackers
Managed cyber defence for companies and organisations

Don't want to get screwed by ransomware or EMOTET?

That's a good thing. We will be at your side.

At the Cyber Defence Center, we detect security incidents in our customers' network infrastructure - quickly and 24/7.

"I protect my customers."

Hasan Al-Khuder
IT Security Analyst at ConSecur GmbH

Managed Cyber Defence at ConSecur
At the Cyber Defence Center, we detect security incidents in our customers' network infrastructure - quickly and 24/7

This is achieved through the organised cooperation of state-of-the-art technology and IT-Security-Fachkraft, which together form an effective protective shield for IT infrastructures against cyber attacks.

Companies and organisations book the protective shield for their IT infrastructure as a managed service, including specialist personnel and state-of-the-art technological support.

Cyber defence for your company? With the help of a proof of concept (PoC), we will find the IT security solution that suits you!

Let's talk about the following topics!

  • IT security monitoring
  • Detection

 

Managed cyber defence with the Cyber Defence Center (CDC) from ConSecur GmbH

Companies and organisations benefit from the Cyber Defence Center from

  • Continuous monitoring of threats
  • Rapid detection and response
  • cost transparency
  • Access to experienced IT security personnel

 

Always alert and ready to act
How does the Cyber Defence Center work?

At the Cyber Defence Centre, we deal with the way others think. Every day, we see cyber criminals using increasingly sophisticated attack techniques to deceive people in order to cause maximum damage to the IT systems of companies, authorities and organisations.

With ConSecur GmbH's Managed CDC, companies and organisations can counteract this with minimal personnel, technical and spatial resources.

 

IT security monitoring 24/7
For early detection of cyber attacks and continuous improvement

Permanent IT security monitoring around the clock is the basis of successful cyber defence.

Put simply, we have everything with an IP address on screen at the Cyber Defence Centre. Servers, clients, network devices, multifunctional devices, routers and other IT assets are connected to the continuous security monitoring that we operate around the clock in the Cyber Defence Center.

This enables us to recognise threats to the IT network at an early stage and initiate countermeasures before any damage can occur.

At the same time, the Cyber Defence Centre will undergo a continuous improvement process and continue to grow: we will implement new rules to identify known attack patterns with the support of state-of-the-art detection mechanisms. This set of rules will free up the time of our IT security analysts to focus on detecting previously unknown threat scenarios.

 

Visualise threats
Detection mechanisms report potential threats via the ticket system

The dashboard of the ticket system visualises potential threats. These IT security alerts indicate access or activities in the IT network that are suspicious and could therefore be IT security incidents.

IT security alerts originate from the tool used, which has recorded the log files of the connected sources and analysed them for certain patterns.

Is it a security incident or a false alarm (false positive)? This decision is made by the IT security analysts.

 

Cyber Defence Centre (CDC)
Differentiate between security incidents and authorised access

In IT security monitoring, the IT security analysts in the Cyber Defence Centre monitor activities within IT networks using state-of-the-art technology.

Here, IT security analysts differentiate between security incidents and authorised access. In the event of a potential threat, they take appropriate measures in coordination with our customers' IT department to prevent attacks or initiate countermeasures.

We employ specialists such as IT-Security-Fachkraft around the clock to get to the bottom of anomalies and, in combination with human expertise, rely on state-of-the-art technology to assist us.

 

Detection, security incident or false alarm?
IT security analysts recognise threats.

The job of IT security analysts is to be suspicious.

Is it a security incident or a false alarm? Within a predefined response time, IT security analysts will process each reported alarm. Their task is to analyse and classify these IT security alerts and escalate them in the event of a security incident.

IT security analysts recognise threats and are ready to initiate appropriate countermeasures on an ad hoc basis. Fast, coordinated action is crucial when recognising and fending off threats.

Alerts are triggered in the SIEM tool when the reported IT security alert shows suspicious patterns or behaviours that appear to bear the hallmarks of a security incident.

Feel free to contact us

Do you have any questions about our cyber defence solutions or do you need advice on CDC?
Our team of experts will be happy to help!

Book a consultation

Stephan Ilic

CDC-Manager