Security Operations Center (SOC) experts at Secur stand between you and security threats that can damage your business. Whether that means constantly evolving fraud-prevention services, shutting down malicious sites, or layering protections with Silverline application services, the SOC is at your service 24×7.

Find out how the expertise and services offered via the Secur SOC can deflect the ever-growing number of security threats leveled at your business.

security operations center

SOC Manage Features

The following services are delivered as a fully managed service:

For each of these services Secur can provide:

  • Ownership of the ongoing management of security infrastructure
  • 24/7 monitoring and support
  • Hotfix and patch updates
  • Threat management updates
  • Continuous vulnerability management
  • Change control verification
  • Health and availability monitoring (SNMP/netflow data analysis)

soc certification

Firewall Management

Effective Firewall management requires a high level of expertise, experience and knowledge.  In order to protect against malicious activity these security devices must be scoped, setup, installed, patched and regularly reviewed.  The service provided by Secur can be depended on to reduce the cost of managing and owning security infrastructure whilst ensuring secure controls are applied throughout the network.

Security threats such as WannaCry could have been prevented through effective perimeter and internal security.  It’s vital staff managing firewalls understand the threat landscape and are aware of what services carry the most risk.  This can ensure businesses are advised on best security practise with constantly changing requirements and environments.

Secur’s firewall management provides 24/7 support, configuration and advice.  When this service is aligned with SOC Monitor, Secur can offer a complete service when threats are detected to immediately respond and counter any threats.

IDS/IPS Management

Secur’s IDS/IPS offerings provide visibility and active protection at both the network perimeter and also key points of the network to ensure data and key services are protected and run effectively.

Threat intelligence gathered through Secur’s honeypot network provides information that can be transferred into custom IDS/IPS rules or tuning of current rules/policies.  The Secur SOC -Manage team also tune devices according to the specific requirements of the network they monitor.

Effectively managing and monitoring IPS/IDS devices can often be overwhelming for internal IT teams with constant tuning and monitoring of alerts required.  Secur’s SOC manage team can act as a security partner to assist overwhelmed Internal IT teams and offer expert response and remediation advice where required.

security operations center

Networking Infrastructure

Secur SOC Manage employees have several years’ experience in network design, configuration and support with switches, routers and wireless products from Cisco, HP, Juniper, Nexus and Meraki.  The SOC Manage team can scope requirements ranging from new greenfield sites to upgrades in capacity or single core switches.

Cloud Based Multi-Factor Authentication

Secur utilise SafeNet products to offer clients a secure authentication mechanism.  With password brute force and weak passwords still a regular method of compromise two-factor authentication is an effective mitigation.   The new requirements in PCI 3.2 also state any personnel to systems handling card data to use multi-factor authentication.  Secur SOC Manage staff can offer best practise advice, installation and ongoing configuration assistance.

PCI Environment Management

Complete PCI environments are managed through the utilisation of several tools to offer patching, authentication, reporting, documentation, security management, vulnerability scanning and remediation.  Secur SOC Manage can offer services that cover specific PCI security requirements such as firewall management to full PCI environment management.


Protect Your Most Valuable Asset—Your Brand

If your business has a web presence, you’re a target for malicious forces. In this threat filled world, it’s important to have strong expertise on your side. SOC experts defeat threats before they impact your business and tarnish your brand.

Specialized Security Experts? They Work Here.

SOC experts have an unrivalled breadth and depth of industry experience. They’re using industry-leading F5 products combined with state-of-the-art security tools to ensure the best protection possible for your applications. They hold more than eighteen security certifications, including: CISSP, CEH, CSFA, CDRE, Security+, CCNA Security, F5 Certified, GIAC and more.

We Don’t Wait for Your Call

More often, a SOC expert will call you. That’s because Secur experts constantly monitor your website traffic, so they can get in front of any suspicious activity or attack. They’ll work with third parties, including governments, to take down malicious sites that are trying to do you harm.

Early Identification

Identify suspicious events allowing our trained security specialists to investigate and respond


Monthly Reporting

Monthly reports showing volumes and trends of security incidents, providing an accurate trail of remediation actions, essential to keep up to date with current security trends

Continuous Improvement

Highlight opportunities to improve security posture, to meet regulatory compliance and audits

Real-Time Monitoring

Real-time monitoring through SIEM (Security Information Event Management)


Get in Touch

+27 (0) 11-881-5943
Click to email
Request a Quote