{"id":606,"date":"2023-09-11T13:26:10","date_gmt":"2023-09-11T06:26:10","guid":{"rendered":"https:\/\/vietsifo.vn\/?page_id=606"},"modified":"2023-10-06T13:47:12","modified_gmt":"2023-10-06T06:47:12","slug":"cyber-security-operations-center-soc","status":"publish","type":"page","link":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/","title":{"rendered":"SECURITY OPERATIONS CENTER (SOC)"},"content":{"rendered":"  <div id=\"page-header-1969222891\" class=\"page-header-wrapper\">\n  <div class=\"page-title uni-page-header dark featured-title\">\n\n        <div class=\"page-title-bg\">\n      <div class=\"title-bg fill bg-fill\"\n        data-parallax-container=\".page-title\"\n        data-parallax-background\n        data-parallax=\"-\">\n      <\/div>\n      <div class=\"title-overlay fill\"><\/div>\n    <\/div>\n    \n    <div class=\"page-title-inner container align-center flex-row medium-flex-wrap\" >\n              <div class=\"title-wrapper is-larger flex-col text-left medium-text-center\">\n          <h1 class=\"entry-title mb-0\">\n            Services          <\/h1>\n        <\/div>\n                    <div class=\"title-content flex-col flex-right text-right medium-text-center\">\n        <div class=\"title-breadcrumbs pb-half pt-half\"><\/div>      <\/div>\n    <\/div>\n\n     \n<style>\n#page-header-1969222891 .page-title-inner {\n  min-height: 200px;\n}\n#page-header-1969222891 .title-bg {\n  background-image: url(https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Banner.jpg);\n}\n#page-header-1969222891 .title-overlay {\n  background-color: rgba(255, 255, 255, 0);\n}\n@media (min-width:550px) {\n  #page-header-1969222891 .page-title-inner {\n    min-height: 250px;\n  }\n}\n@media (min-width:850px) {\n  #page-header-1969222891 .page-title-inner {\n    min-height: 300px;\n  }\n}\n<\/style>\n  <\/div>\n    <\/div>\n  \n\t<section class=\"section\" id=\"section_2127458903\">\n\t\t<div class=\"bg section-bg fill bg-fill  bg-loaded\" >\n\n\t\t\t\n\t\t\t\n\t\t\t\n\n\t\t<\/div>\n\n\t\t\n\n\t\t<div class=\"section-content relative\">\n\t\t\t\n\t<div id=\"gap-892315986\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-892315986 {\n  padding-top: 30px;\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-315508566\">\n\n\t<div id=\"col-38320551\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner box-shadow-1\" style=\"background-color:rgb(255, 255, 255);\" >\n\t\t\t\n\t\t\t\n<div class=\"row align-middle\"  id=\"row-583092625\">\n\n\t<div id=\"col-60636997\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-3957395257\" class=\"text\">\n\t\t\n<h2>Security Operations Center (SOC)<\/h2>\n\t\t\n<style>\n#text-3957395257 {\n  font-size: 1.3rem;\n}\n@media (min-width:850px) {\n  #text-3957395257 {\n    font-size: 1.614062540625rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<p style=\"text-align: justify;\">A Security Operations Center (SOC) involves people, processes and technology, providing system-wide security through the development of detect, contain and overcome information technology threats. The SOC will handle any IT incident or threat on behalf of an organization or company and ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to detect possible attacks or intrusions (events) and determine whether it is a genuine malicious threat (incident) and whether it could affect the application. affect business activities or not<\/p>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-1159610361\" class=\"col medium-6 small-12 large-6\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div class=\"img has-hover brd-15 x md-x lg-x y md-y lg-y\" id=\"image_321317622\">\n\t\t\t\t\t\t\t\t<div class=\"img-inner dark\" >\n\t\t\t<img width=\"1020\" height=\"590\" src=\"https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Network-security.jpg\" class=\"attachment-large size-large\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Network-security.jpg 1024w, https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Network-security-300x173.jpg 300w, https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/Network-security-768x444.jpg 768w\" sizes=\"(max-width: 1020px) 100vw, 1020px\" \/>\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n<style>\n#image_321317622 {\n  width: 100%;\n}\n<\/style>\n\t<\/div>\n\t\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\t\t\t\t\n<style>\n#col-38320551 > .col-inner {\n  padding: 30px 30px 0px 30px;\n  border-radius: 15px;\n}\n@media (min-width:850px) {\n  #col-38320551 > .col-inner {\n    padding: 40px 40px 10px 40px;\n  }\n}\n<\/style>\n\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-430957415\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-430957415 {\n  padding-top: 60px;\n}\n@media (min-width:550px) {\n  #gap-430957415 {\n    padding-top: 80px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-34509538\">\n\n\t<div id=\"col-24732372\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-3974843842\" class=\"text\">\n\t\t\n<h2>1. Extensible Detection and Response (XDR) Platform<\/h2>\n\t\t\n<style>\n#text-3974843842 {\n  font-size: 1.171875rem;\n}\n<\/style>\n\t<\/div>\n\t\n<ul>\n<li>Product: LMNTRIX XDR<\/li>\n<li>Brand: LMNTRIX<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Today, SOCs need sufficient resources to deploy an effective defense for the constantly changing IT environment. However, most SOCs are still\u00a0 inadequate to prevent attackers (even unsophisticated attackers) from gaining access to enterprise systems. This situation may come from the following reasons:<\/p>\n<ul>\n<li>Lack of qualified personnel to take advantage of available protection tools, research and in-depth investigation of incidents.<\/li>\n<li>Lack of tools that use AI and ML technology to automate the detection and <span style=\"color: #555555;\">deal with risks<\/span><\/li>\n<li>It is quite difficult to integrate many solutions from many different brands so that the SOC system can operate smoothly and effectively.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">LMNTRIX&#8217;s LMNTRIX XDR solution combines AI, Underground Intelligence, NGAV, EDR, NDR, Network Forensics, UEBA and Deception Everywhere technologies, providing verification and control. Automated attack detection, control, and remediation on a single platform at no additional cost. The solution is backed by 24\/7 Detection and Response Services for even the smallest security teams.<\/p>\n<p style=\"text-align: justify;\">LMNTRIX XDR is a unique forensic platform for understanding threats across Onpremise, Cloud, Multi Cloud and industrial control systems (ICS) . LMNTRIX XDR will offer unique advantages over current cybersecurity solutions<\/p>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n\n\t<div id=\"col-397092713\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\t<div id=\"text-2058430497\" class=\"text\">\n\t\t\n<h2>2. Protecting your brand in cyberspace:<\/h2>\n\t\t\n<style>\n#text-2058430497 {\n  font-size: 1.171875rem;\n}\n<\/style>\n\t<\/div>\n\t\n<ul>\n<li style=\"text-align: justify;\">Product: Redpoints Brand Protection<\/li>\n<li style=\"text-align: justify;\">Brand: Redpoints<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Currently, online shopping has become a popular trend and is favored by the majority of consumers. This has promoted the strong development of e-commerce.<\/p>\n<p style=\"text-align: justify;\">E-commerce has opened a wide door for businesses, allowing them to reach a larger number of potential customers and increase interaction. with consumers through online channels. But it cannot be denied that this development also brings some risks of being attacked by bad guys, appropriating intellectual property of businesses and defrauding customers.<\/p>\n<p style=\"text-align: justify;\">Bad practices target every industry from pharmaceutical products to software and even wind generator manufacturers. They use a range of tactics, from creating fake websites, copying businesses&#8217; social media accounts, to creating and selling counterfeit goods. This can cause unsuspecting customers to purchase counterfeit goods or provide their personal information in a dangerous way. The worst part of all is that in most cases, the official brands are often blamed.<\/p>\n<p style=\"text-align: justify;\">Therefore, brand protection has become an important element in each brand&#8217;s business plan, to protect reputation and prevent customers from being deceived. Buy unsafe or poor quality products.<\/p>\n<p style=\"text-align: justify;\">When done right, a powerful brand protection strategy and tools not only have a direct impact on customer satisfaction, but can also has a positive impact on business revenue.<\/p>\n<p style=\"text-align: justify;\">However, protecting a brand can be an expensive and resource-intensive task for companies of all sizes. That&#8217;s why more than 1,200 brands have chosen to use Red Points&#8217; advanced brand protection software. The outstanding capabilities of this solution include:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Real-time protection: Red Point&#8217;s system operates continuously 24\/7 to detect and eliminate all bad behavior.<\/li>\n<li>A team of knowledgeable experts.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"color: #555555;\">In addition, Redpoints Brand Protection product of Redpoints also has a level of <\/span><span style=\"color: # 555555;\">fixed fees, helping businesses easily estimate costs and manage finances effectively<\/span><\/p>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n<div class=\"row\"  id=\"row-168861785\">\n\n\t<div id=\"col-1605229238\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n<div class=\"social-icons share-icons share-row relative icon-style-fill\" ><span class=\"share-icons-title\">Share:<\/span><a href=\"whatsapp:\/\/send?text=SECURITY%20OPERATIONS%20CENTER%20%28SOC%29 - https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\" data-action=\"share\/whatsapp\/share\" class=\"icon primary button circle tooltip whatsapp show-for-medium\" title=\"Share on WhatsApp\" aria-label=\"Share on WhatsApp\" ><i class=\"icon-whatsapp\" ><\/i><\/a><a href=\"https:\/\/www.facebook.com\/sharer.php?u=https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\" data-label=\"Facebook\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip facebook\" title=\"Share on Facebook\" aria-label=\"Share on Facebook\" ><i class=\"icon-facebook\" ><\/i><\/a><a href=\"https:\/\/twitter.com\/share?url=https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip twitter\" title=\"Share on Twitter\" aria-label=\"Share on Twitter\" ><i class=\"icon-twitter\" ><\/i><\/a><a href=\"mailto:?subject=SECURITY%20OPERATIONS%20CENTER%20%28SOC%29&body=Check%20this%20out%3A%20https%3A%2F%2Fvietsifo.vn%2Fen%2Fservices%2Fcyber-security-operations-center-soc%2F\" rel=\"nofollow\" class=\"icon primary button circle tooltip email\" title=\"Email to a Friend\" aria-label=\"Email to a Friend\" ><i class=\"icon-envelop\" ><\/i><\/a><a href=\"https:\/\/pinterest.com\/pin\/create\/button?url=https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/&media&description=SECURITY%20OPERATIONS%20CENTER%20%28SOC%29\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip pinterest\" title=\"Pin on Pinterest\" aria-label=\"Pin on Pinterest\" ><i class=\"icon-pinterest\" ><\/i><\/a><a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/&title=SECURITY%20OPERATIONS%20CENTER%20%28SOC%29\" onclick=\"window.open(this.href,this.title,'width=500,height=500,top=300px,left=300px'); return false;\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" class=\"icon primary button circle tooltip linkedin\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" ><i class=\"icon-linkedin\" ><\/i><\/a><\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t<div id=\"gap-1249029820\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1249029820 {\n  padding-top: 60px;\n}\n@media (min-width:550px) {\n  #gap-1249029820 {\n    padding-top: 80px;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n<div class=\"row\"  id=\"row-2007466958\">\n\n\t<div id=\"col-1598395077\" class=\"col small-12 large-12\"  >\n\t\t\t\t<div class=\"col-inner\"  >\n\t\t\t\n\t\t\t\n\n  <div class=\"banner has-hover brd-20\" id=\"banner-109194276\">\n          <div class=\"banner-inner fill\">\n        <div class=\"banner-bg fill\" >\n            <div class=\"bg fill bg-fill \"><\/div>\n                        <div class=\"overlay\"><\/div>            \n                    <\/div>\n\t\t\n        <div class=\"banner-layers container\">\n            <div class=\"fill banner-link\"><\/div>            \n\n   <div id=\"text-box-1423557803\" class=\"text-box banner-layer x5 md-x5 lg-x5 y50 md-y50 lg-y50 res-text\">\n                                <div class=\"text-box-content text dark\">\n              \n              <div class=\"text-inner text-left\">\n                  \n\n\t<div id=\"text-2509551452\" class=\"text p-0 font-600\">\n\t\t\n\n<h5>VIET SIFO<\/h5>\n\t\t\n<style>\n#text-2509551452 {\n  font-size: 1rem;\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"text-381599587\" class=\"text\">\n\t\t\n\n<h3>Bringing safety in cyberspace<\/h3>\n\n\t\t\n<style>\n#text-381599587 {\n  font-size: 1rem;\n  color: rgb(255, 255, 255);\n}\n#text-381599587 > * {\n  color: rgb(255, 255, 255);\n}\n@media (min-width:550px) {\n  #text-381599587 {\n    font-size: 1.2rem;\n  }\n}\n@media (min-width:850px) {\n  #text-381599587 {\n    font-size: 1.125rem;\n  }\n}\n<\/style>\n\t<\/div>\n\t\n\t<div id=\"gap-1203310211\" class=\"gap-element clearfix\" style=\"display:block; height:auto;\">\n\t\t\n<style>\n#gap-1203310211 {\n  padding-top: 15px;\n}\n<\/style>\n\t<\/div>\n\t\n\n<a href=\"#dangky\" target=\"_self\" class=\"button primary lowercase button-main\"  style=\"border-radius:5px;\">\n    <span>Sign up for consultation<\/span>\n  <\/a>\n\n\n\n              <\/div>\n           <\/div>\n                            \n<style>\n#text-box-1423557803 {\n  width: 90%;\n}\n#text-box-1423557803 .text-box-content {\n  font-size: 100%;\n}\n@media (min-width:550px) {\n  #text-box-1423557803 {\n    width: 60%;\n  }\n}\n@media (min-width:850px) {\n  #text-box-1423557803 {\n    width: 40%;\n  }\n}\n<\/style>\n    <\/div>\n \n\n        <\/div>\n      <\/div>\n\n            \n<style>\n#banner-109194276 {\n  padding-top: 460px;\n}\n#banner-109194276 .bg.bg-loaded {\n  background-image: url(https:\/\/vietsifo.vn\/wp-content\/uploads\/2023\/09\/bg.png);\n}\n#banner-109194276 .overlay {\n  background-color: rgba(255, 255, 255, 0);\n}\n#banner-109194276 .bg {\n  background-position: 38% 36%;\n}\n<\/style>\n  <\/div>\n\n\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\n\t\n<\/div>\n\t\t<\/div>\n\n\t\t\n<style>\n#section_2127458903 {\n  padding-top: 30px;\n  padding-bottom: 30px;\n}\n@media (min-width:850px) {\n  #section_2127458903 {\n    padding-top: 70px;\n    padding-bottom: 70px;\n  }\n}\n<\/style>\n\t<\/section>\n\t\n","protected":false},"excerpt":{"rendered":"<p>A Security Operations Center (SOC) involves people, processes and technology, providing system-wide security through detecting, containing and remediating industrial threats. The SOC will handle any IT incident or threat on behalf of an organization or company and ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to detect possible attacks or intrusions (events) and determine whether it is a genuine malicious threat (incident) and whether it could affect the application. affect business operations or not.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":595,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-service.php","meta":{"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\" \/>\n<meta property=\"og:description\" content=\"A Security Operations Center (SOC) involves people, processes and technology, providing system-wide security through detecting, containing and remediating industrial threats. The SOC will handle any IT incident or threat on behalf of an organization or company and ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to detect possible attacks or intrusions (events) and determine whether it is a genuine malicious threat (incident) and whether it could affect the application. affect business operations or not.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-06T06:47:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\",\"url\":\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\",\"name\":\"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\",\"isPartOf\":{\"@id\":\"https:\/\/vietsifo.vn\/en\/#website\"},\"datePublished\":\"2023-09-11T06:26:10+00:00\",\"dateModified\":\"2023-10-06T06:47:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vietsifo.vn\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/vietsifo.vn\/en\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SECURITY OPERATIONS CENTER (SOC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vietsifo.vn\/en\/#website\",\"url\":\"https:\/\/vietsifo.vn\/en\/\",\"name\":\"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vietsifo.vn\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/","og_locale":"en_US","og_type":"article","og_title":"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","og_description":"A Security Operations Center (SOC) involves people, processes and technology, providing system-wide security through detecting, containing and remediating industrial threats. The SOC will handle any IT incident or threat on behalf of an organization or company and ensure that it is properly identified, analyzed, communicated, investigated and reported. The SOC also monitors applications to detect possible attacks or intrusions (events) and determine whether it is a genuine malicious threat (incident) and whether it could affect the application. affect business operations or not.","og_url":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/","og_site_name":"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","article_modified_time":"2023-10-06T06:47:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/","url":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/","name":"SECURITY OPERATIONS CENTER (SOC) - C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","isPartOf":{"@id":"https:\/\/vietsifo.vn\/en\/#website"},"datePublished":"2023-09-11T06:26:10+00:00","dateModified":"2023-10-06T06:47:12+00:00","breadcrumb":{"@id":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/vietsifo.vn\/en\/services\/cyber-security-operations-center-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vietsifo.vn\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/vietsifo.vn\/en\/services\/"},{"@type":"ListItem","position":3,"name":"SECURITY OPERATIONS CENTER (SOC)"}]},{"@type":"WebSite","@id":"https:\/\/vietsifo.vn\/en\/#website","url":"https:\/\/vietsifo.vn\/en\/","name":"C\u00d4NG TY C\u1ed4 PH\u1ea6N GI\u1ea2I PH\u00c1P C\u00d4NG NGH\u1ec6 CAO VI\u1ec6T SIFO","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vietsifo.vn\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/606"}],"collection":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/comments?post=606"}],"version-history":[{"count":7,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/606\/revisions"}],"predecessor-version":[{"id":734,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/606\/revisions\/734"}],"up":[{"embeddable":true,"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/pages\/595"}],"wp:attachment":[{"href":"https:\/\/vietsifo.vn\/en\/wp-json\/wp\/v2\/media?parent=606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}