النظرة الاستراتيجية
Strategic Vision
دوافع المشروع
The Why
الأهداف الرئيسية
Key Benefits
الخدمات المقدّمة
Service Offering
آلية العمل
How Does it Work?
MTTA
MTTR
MTTR
لا تزال هجمات الفدية تشكل الخطر الأكبر حيث يزداد تركيز مجموعات الاختراق العالمية على المنطقة، تشكل هجمات الفدية ما نسبته 51% من مجموع الاختراقات المسجلة في الدولة.
Ransomware attacks remain the biggest threat as global hacking groups increasingly focus on the region, with ransomware attacks accounting for 51% of all breaches recorded in the country.
Year | Global | Middle East |
2022 | 4.35 | 7.46 |
2023 | 4.45 | 8.07 |
2024 | 4.88 | 8.57 |
DDoS Attacks targeting UAE: | |
2022 | 150,204 |
2023 | 213,434 |
2024 | 266,512 |
The SOC relies on a suite of advanced tools and technologies, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and threat intelligence platforms and etc.. These technologies help the team to automate tasks, detect threats, and gain insights into organization's security posture.
The SOC team consists of skilled security analysts and incident responders who monitor, detect, and manage security incidents. They bring expertise to identify threats, analyze risks, and coordinate responses to protect the organization.
Standardized procedures guide how the SOC operates, ensuring a consistent approach to threat detection, incident response, and recovery. This includes everything from alert handling to incident escalation and reporting.
Collects and analyzes data on emerging threats to inform and improve defenses
Investigates security breaches, performs forensic analysis, and recovers critical data.
Oversees SOC operations, ensuring security processes and policies are followed effectively
Conducts simulated attacks to test and strengthen the organization's defenses
Manages audits, ensures compliance, and aligns security with governance frameworks
Monitors and detects security threats and events as the frontline of SOC defense
To manage and improve the security operations. It outlines the tools, processes, people, and strategies required to detect, prevent, respond to, and recover from cybersecurity incidents.
This process focuses on designing and improving detection mechanisms to identify threats within the network or systems.
This process involves collecting, storing, analyzing, and monitoring security logs to detect suspicious or malicious activity.
This process is responsible for handling security incidents, minimizing damage, and restoring normal operations.
Identity
Endpoint & Servers
Network
Data
Cloud
Application
Identity
Endpoint & Servers
Network
Data
Cloud
Application
الأحداث الأمنية التي تمت معالجتها وتحليلها
Security events processed and analyzed per month
حالات استخدام أمنية مُطبقة لإنشاء تنبيهات أمنية
Security Use cases deployed to generate Security notables
التنبيهات الأمنية والطلبات التي يتم حلها شهرياً
Security Alerts and requests handled per month
عدد النصائح الأمنية التي تم نشرها
Threat advisories created, published and released
عدد عمليات التصيد التي تم تنفيذها
IOC Driven Threat Hunts performed
عدد الحوادث الأمنية التي تم التعامل معها شهرياً
Potential incidents handled per month