{"version":"1.0","provider_name":"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","provider_url":"https:\/\/vietsifo.vn\/en\/","author_name":"uniadmin","author_url":"https:\/\/vietsifo.vn\/en\/author\/uniadmin\/","title":"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Rb6w7uiFn1\"><a href=\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\">SECURITY OPERATIONS CENTER (SOC)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/embed\/#?secret=Rb6w7uiFn1\" width=\"600\" height=\"338\" title=\"&#8220;SECURITY OPERATIONS CENTER (SOC)&#8221; &#8212; C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\" data-secret=\"Rb6w7uiFn1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"A Security Operations Center (SOC) involves people, processes and technology, providing system-wide security through detecting, containing and remediating industrial threats. The SOC will handle any IT incident or threat on behalf of an organization or company and ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to detect possible attacks or intrusions (events) and determine whether it is a genuine malicious threat (incident) and whether it could affect the application. affect business operations or not."}