{"id":12853,"date":"2023-09-22T09:35:28","date_gmt":"2023-09-22T09:35:28","guid":{"rendered":"http:\/\/brihastech.com\/?page_id=12853"},"modified":"2023-09-27T07:04:39","modified_gmt":"2023-09-27T07:04:39","slug":"security-operations-center","status":"publish","type":"page","link":"https:\/\/brihastech.com\/index.php\/security-operations-center\/","title":{"rendered":"Security Operations Center"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"12853\" class=\"elementor elementor-12853\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-513a1f3 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle\" data-id=\"513a1f3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-91e524a\" data-id=\"91e524a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d3d72e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1d3d72e\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 14-09-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-xl\">security operations center<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a475fc elementor-widget elementor-widget-text-editor\" data-id=\"7a475fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 14-09-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>Our SOC gathers data in real-time across the organization using automation to detect and respond to cybersecurity threats.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-eca18f3\" data-id=\"eca18f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-209688a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"209688a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ed09a01\" data-id=\"ed09a01\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39a903e elementor-widget elementor-widget-text-editor\" data-id=\"39a903e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Through our robust, next-gen tools we proactively detect security issues, protect data and systems. We bring comprehensive coverage of the key IT systems and applications into our monitoring scope and respond with standard incident response frameworks.<\/p><p>We ensure that people, processes and technology work in tandem to enhance the security posture of the business. Our comprehensive four-part model covers every aspect of security management, leading your SOC program in the right direction.<\/p><p>Incident response, engineering, threat monitoring, and analytics are the four components of the security operations center model. Each of these works closely with the other to ensure that the ongoing process of maintaining security is foolproof.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4514d92\" data-id=\"4514d92\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae6983a elementor-invisible elementor-widget elementor-widget-image\" data-id=\"ae6983a\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;ova-helix&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 14-09-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-1024x683.jpg\" class=\"attachment-large size-large wp-image-12788\" alt=\"\" srcset=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-1024x683.jpg 1024w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-300x200.jpg 300w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-scaled-600x400.jpg 600w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-768x512.jpg 768w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-1536x1024.jpg 1536w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-thisisengineering-3861969-2048x1366.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d6aab26 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6aab26\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-246bc8a\" data-id=\"246bc8a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8c66a9 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"b8c66a9\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC IMPLEMENTATION APPROACH<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07e501b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"07e501b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6fc2199\" data-id=\"6fc2199\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-221e3ea elementor-invisible elementor-widget elementor-widget-image\" data-id=\"221e3ea\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomInLeft&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"686\" src=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3-1024x878.jpg\" class=\"attachment-large size-large wp-image-12987\" alt=\"\" srcset=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3-1024x878.jpg 1024w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3-300x257.jpg 300w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3-600x515.jpg 600w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3-768x660.jpg 768w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/resim-3.jpg 1180w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e5a1c54\" data-id=\"e5a1c54\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b1ea8d elementor-widget elementor-widget-text-editor\" data-id=\"9b1ea8d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The security operations center services monitors and analyses network, server, endpoint, database, application, website, and other system activities. It keeps an eye out for any unusual activity that could indicate a security event or breach.\u00a0<\/p><p>The SOC is in charge of properly identifying, analysing, defending, investigating, and reporting potential security events.\u00a0The SOC\u2019s 24-hour monitoring provides businesses an edge in defending against events and intrusions, regardless of source, time of day, or kind of assault. We ensure that people, processes and technology work in tandem to enhance the security posture of the business. Our comprehensive four-part model covers every aspect of security management, leading your SOC program in the right direction. Incident response, engineering, threat monitoring, and analytics are the four components of the security operations model. Each of these works closely with the other to ensure that the ongoing process of maintaining security is foolproof.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9315416 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9315416\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27c7f89\" data-id=\"27c7f89\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ac6af2 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3ac6af2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SERVICES MONITORED IN SOC<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbd065 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"fdbd065\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/SIEM-Functions.webp\" class=\"attachment-large size-large wp-image-12994\" alt=\"\" srcset=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/SIEM-Functions.webp 1024w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/SIEM-Functions-300x225.webp 300w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/SIEM-Functions-600x450.webp 600w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/SIEM-Functions-768x576.webp 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83a0d39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83a0d39\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-06c9834\" data-id=\"06c9834\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2179bc5 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"2179bc5\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC STRUCTURE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4862e3b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4862e3b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae14138\" data-id=\"ae14138\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86bfbaf elementor-widget elementor-widget-image\" data-id=\"86bfbaf\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"443\" src=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/soc-key.png\" class=\"attachment-large size-large wp-image-12989\" alt=\"\" srcset=\"https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/soc-key.png 912w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/soc-key-300x166.png 300w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/soc-key-600x332.png 600w, https:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/soc-key-768x425.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8440fea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8440fea\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4b49ead\" data-id=\"4b49ead\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9cc52d1 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"9cc52d1\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SOC BENEFITS<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d24c164 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d24c164\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-139808b\" data-id=\"139808b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c128b82 elementor-widget elementor-widget-infetech_elementor_ova_icon_list\" data-id=\"c128b82\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_ova_icon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t \t                 <div class=\"ova-icon-list ova-icon-list-template2 two_column\">\n\t            \t\n\t\t\t         \n\t\t\t\t\t<div class=\"item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"text-number-wrapper\">\n\t\t\t\t\t\t\t\t<span class=\"text-number\">\n\t\t\t\t\t\t\t\t\t01\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text\">\n\t\t\t\t\t\t\t\tComprehensive coverage with 24\/7 monitoring.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"text-number-wrapper\">\n\t\t\t\t\t\t\t\t<span class=\"text-number\">\n\t\t\t\t\t\t\t\t\t02\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text\">\n\t\t\t\t\t\t\t\tReduce cybersecurity headcount costs.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"text-number-wrapper\">\n\t\t\t\t\t\t\t\t<span class=\"text-number\">\n\t\t\t\t\t\t\t\t\t03\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text\">\n\t\t\t\t\t\t\t\tReduce dwell time &amp; financial impact with robust containment.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"text-number-wrapper\">\n\t\t\t\t\t\t\t\t<span class=\"text-number\">\n\t\t\t\t\t\t\t\t\t04\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text\">\n\t\t\t\t\t\t\t\tThreat triage, remediation, and incident isolation.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<div class=\"item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"text-number-wrapper\">\n\t\t\t\t\t\t\t\t<span class=\"text-number\">\n\t\t\t\t\t\t\t\t\t05\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text\">\n\t\t\t\t\t\t\t\tSecurity stack insight &amp; compatibility.\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-46261dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46261dd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-812dbb2\" data-id=\"812dbb2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69841d6 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"69841d6\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/brihastech.com\/wp-content\/plugins\/elementor\/assets\/css\/widget-icon-list.min.css\">\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analytic monitoring & robust response mechanism<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat hunting & correlation with events<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat intelligence to counter Advanced Persistent Threats (APTs)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Forensic investigation capabilities<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">User and Entity Behaviour Analysis (UEBA)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d6a75ad\" data-id=\"d6a75ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09eb8a8 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"09eb8a8\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Security orchestration, automation and response (SOAR)<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Logging and auditing for compliance<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cloud-based analytics and operations<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Open architectures and layered analytics<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-hand-point-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement & integrate DevSecOps<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a035dae elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a035dae\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fe99a9a\" data-id=\"fe99a9a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ddfd68 elementor-widget elementor-widget-text-editor\" data-id=\"8ddfd68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>The\u00a0<strong>Security Operation Center<\/strong>\u00a0(SOC)8uacts as the company\u2019s intelligence hub, collecting data in real-time from the company\u2019s networks, servers, endpoints, and other digital assets and utilizing intelligent automation to identify, prioritize, and respond to potential cybersecurity threats.<br \/>The people, processes, and technology that are responsible for monitoring, evaluating, and managing an organization\u2019s information security make up a\u00a0<strong>security operations center<\/strong>.<br \/>Most security operations centers have a \u201chub and spoke\u201d configuration, which allows the company to construct a consolidated data repository that can be used for a variety of purposes. The following are some of the SOC\u2019s activities and responsibilities:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-714844c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"714844c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d790c8\" data-id=\"8d790c8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d693d1c elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d693d1c\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">To provide total visibility into digital activities and better spot irregularities, network monitoring is used.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Providing techniques for preventing and deflecting a variety of known and unknown threats.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Threat detection and intelligence capabilities that evaluate the source, impact, and severity of each cyber incident.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Using a combination of automated technologies and human engagement, decisive incident reaction and remediation is possible.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reporting to ensure that all incidents and threats are fed into the data repository in the future, making it more precise and responsive.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-circle\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Risk and compliance capabilities to assure compliance with industry and regulatory standards.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bc9d93d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bc9d93d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-91b7002\" data-id=\"91b7002\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b4643b elementor-widget elementor-widget-text-editor\" data-id=\"5b4643b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>In addition to managing specific incidents, the\u00a0<strong>security operations services<\/strong>\u00a0bring together various data feeds from each asset to build a baseline picture of normal network activity. The SOC then employs this information to detect unusual activity with greater speed and precision.<br \/>One of the SOC\u2019s most important features is that it runs constantly, offering monitoring, detection, and response capabilities 24*7. This helps enterprises shorten their \u201cbreakout time\u201d \u2014 the important window between when an intruder compromises the first machine and when they can move laterally to other sections of the network \u2014 by ensuring threats are isolated and handled fast.<br \/><strong><b>Brihas Technology <\/b>Security Operations Center services<\/strong> involve creating a four-part model that covers all aspects of security management. The four components of <b>Brihas Technology\u00a0<\/b> <strong>security operations services<\/strong>\u00a0are incident response, engineering, threat monitoring, and analytics. Each of these groups collaborates closely to guarantee that the ongoing security process remains intact and on schedule. We provide a security operation team with invaluable information to help improve their organization\u2019s security posture.<br \/>The improvement of security incident detection through constant monitoring and analysis of data activity is a fundamental benefit of having a security operations center. SOC teams are crucial for ensuring rapid detection and response of security issues by evaluating activity across an organization\u2019s networks, endpoints, servers, and databases around the clock. A SOC\u2019s 24*7 monitoring gives businesses an advantage in defending against incidents and intrusions, regardless of source, time of day, or type of assault.<br \/>To achieve good results, the Security Operations Center services must stay current on threat intelligence and use it to strengthen internal detection and defensive processes. The SOC consumes data from within the organization and connects it with information from a variety of external sources to provide insight into risks and vulnerabilities. Newsfeeds, signature updates, incident reports, threat briefs, and vulnerability warnings are all examples of external cyber intelligence that help the SOC stay on top of changing cyber threats. To stay current with threats, SOC members must regularly feed threat intelligence into SOC monitoring systems, and the SOC must have protocols in place to distinguish between true threats and non-threats. <b>Brihas Technology<\/b> follows these best practices to generate robust solutions for businesses. Key IT systems and applications are secured by bringing them into our monitoring scope. The security posture of your business is enhanced by formulating a stringent security response framework. We leverage automation to detect and respond to cyber-security threats across the organization in real-time.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2438e03\" data-id=\"2438e03\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-720b6ce elementor-widget elementor-widget-video\" data-id=\"720b6ce\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 14-09-2023 *\/\n.elementor-widget-video .elementor-widget-container{overflow:hidden;transform:translateZ(0)}.elementor-widget-video .elementor-wrapper{aspect-ratio:var(--video-aspect-ratio)}.elementor-widget-video .elementor-wrapper iframe,.elementor-widget-video .elementor-wrapper video{height:100%;width:100%;display:flex;border:none;background-color:#000}@supports not (aspect-ratio:1\/1){.elementor-widget-video .elementor-wrapper{position:relative;overflow:hidden;height:0;padding-bottom:calc(100% \/ var(--video-aspect-ratio))}.elementor-widget-video .elementor-wrapper iframe,.elementor-widget-video .elementor-wrapper video{position:absolute;top:0;right:0;bottom:0;left:0}}.elementor-widget-video .elementor-open-inline .elementor-custom-embed-image-overlay{position:absolute;top:0;right:0;bottom:0;left:0;background-size:cover;background-position:50%}.elementor-widget-video .elementor-custom-embed-image-overlay{cursor:pointer;text-align:center}.elementor-widget-video .elementor-custom-embed-image-overlay:hover .elementor-custom-embed-play i{opacity:1}.elementor-widget-video .elementor-custom-embed-image-overlay img{display:block;width:100%;aspect-ratio:var(--video-aspect-ratio);-o-object-fit:cover;object-fit:cover;-o-object-position:center center;object-position:center center}@supports not (aspect-ratio:1\/1){.elementor-widget-video .elementor-custom-embed-image-overlay{position:relative;overflow:hidden;height:0;padding-bottom:calc(100% \/ var(--video-aspect-ratio))}.elementor-widget-video .elementor-custom-embed-image-overlay img{position:absolute;top:0;right:0;bottom:0;left:0}}.elementor-widget-video .e-hosted-video .elementor-video{-o-object-fit:cover;object-fit:cover}.e-con-inner>.elementor-widget-video,.e-con>.elementor-widget-video{width:var(--container-widget-width);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"http:\/\/brihastech.com\/wp-content\/uploads\/2023\/09\/pexels-mikhail-nilov-7683091-Original.mp4\" autoplay=\"\" controls=\"\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2fac343 ova-geometry4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2fac343\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e51b15e\" data-id=\"e51b15e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6af42d4 elementor-widget elementor-widget-heading\" data-id=\"6af42d4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Get in touch!<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea60d8c elementor-widget__width-auto elementor-widget elementor-widget-infetech_elementor_heading\" data-id=\"ea60d8c\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n\t\t\t<div class=\"ova-heading\">\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<h2 class=\"sub-title\">\n\t\t\t\t\t\t<span class=\"underlined\"><\/span>\n\t\t\t\t\t\tConnecting People, Process and Technology\n\t\t\t\t\t<\/h2>\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t<h3 class=\"title\">\t\t\t\t\t\t\t\t\t\t\t\t\tBrihas Technology Solutions\n\t\t\t\t\t\t\t\t\t\t\t<\/h3>\n                \n                \n\t\t\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a6355e4\" data-id=\"a6355e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50df663 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"50df663\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/brihastech.com\/index.php\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Contactus<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>security operations center Our SOC gathers data in real-time across the organization using automation to detect and respond to cybersecurity threats. Through our robust, next-gen tools we proactively detect security issues, protect data and systems. We bring comprehensive coverage of the key IT systems and applications into our monitoring scope and respond with standard incident [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-12853","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/pages\/12853"}],"collection":[{"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/comments?post=12853"}],"version-history":[{"count":40,"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/pages\/12853\/revisions"}],"predecessor-version":[{"id":13408,"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/pages\/12853\/revisions\/13408"}],"wp:attachment":[{"href":"https:\/\/brihastech.com\/index.php\/wp-json\/wp\/v2\/media?parent=12853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}