Security Operations Center (SOC)

A 360° view to identify security threats and respond with a clear monthly price. We ensure that your business is at a level of security where we can proactively identify and respond to threats in a timely manner – tirelessly, month after month. The service helps you achieve compliance with the NIS2- Directive requirements.

Continuous service to identify security threats in time

The costs caused by serious security incidents are much higher than the costs of preparing for them.

The SOC (Security Operation Center) takes care of your security by monitoring your endpoints, servers, network and cloud by collecting security logs and alerts from your ICT infrastructure. Our SOC team reacts to potential problems, for example, by isolating and containing a potential malware event.

Best of all, you gain the package you need in a clearly priced, monthly and ongoing service. Workstations, servers, cloud services and data are kept safe, whether you’re working from inside or outside your company’s network.

In other words, the security incident management package identifies, detects, classifies, isolates and recovers from detected security incidents in real time, according to the service level agreed with you.

NIS2 Compliance

Ensure NIS2 Compliance with a SOC Service

The NIS2 Directive, which came into effect in October 2024, applies to a wide range of Finnish companies and public administration entities. Read more about the NIS2 security requirements and who is affected by NIS2.

According to the NIS2 Directive, security breaches must be reported within 24 hours, which in practice requires an effective SOC service. Avoid the consequences of non-compliance with the NIS2 Directive.

Why choose Tietokeskus SOC service?

What is a security incident?

A typical example of a security incident is a situation where our Managed Detection and Response (MDR) service detects that malware has been injected into a particular expert’s workstation, or the workstation is otherwise behaving strangely. It is, therefore, reasonable to assume that someone is trying to access your company’s data or network via the workstation.

How Tietokeskus react to a security incident?

When a security incident occurs, the Tietokeskus Security Incident Management receives an alert. We have agreed with you a severity level above which we will automatically and quickly isolate the workstation from the rest of your business network.

We will immediately contact the user of the workstation and make sure that the alert is for the correct workstation. We will agree with the user on a safe wiping of the workstation, or even a replacement if the infected workstation requires further investigation and analysis.

Interested in our SOC services?

Leave your contact details and we will be in touch.

Sampo Suojala

Sales Director
sampo.suojala@tietokeskus.fi