Products & Services

 

The Latest
The Latest

New
Offering

SmartCLOUD™ Compute
SmartCLOUD™ Compute

Free Trial

SmartCLOUD™ DaaS
SmartCLOUD™ DaaS

P O C

SmartCLOUD™ M@il
SmartCLOUD™ M@il

Online
Quotation

Managed Security Service

Your Security is Our Top Priority

High profile breaches are on the rise. Online communities are becoming more aware and additional compliance requirements make IT security everyone’s top priority. CITIC Telecom CPC TrustCSI™ Managed Security Services, complementing multiple Security Operations Centers (SOCs) with high availability and disaster recovery functionality, are designed to help you handle these increasing IT security demands effectively. Based on ISO27001 certified processes, we provide robust 24 x 7 monitoring and help businesses identify and analyze vulnerabilities, prioritize threats as well as refine security policies and processes.

Sales Hotline:
+852 2170 7401

Your Total Peace of Mind Protection Solution


Highlights

  • Dedicated Team of Security Professionals --- Striving for service excellence, CITIC Telecom CPC security professionals are 100% certified with international security programs such as CISA, CISSP and CompTIA Security+. With CITIC Telecom CPC, organizations have access to the most skillful security experts in APAC region, certified in a wide range of technologies.
  • World-class Security Operations Centers (SOCs) --- CITIC Telecom CPC’s SOCs are certified with a series of international certifications include ISO9001, ISO14001, ISO20000, ISO27017 and ISO27001 Information Security Management System, as well as complied with ITIL processes, ensuring TrustCSI™ MSS brings consistency in the way that threats and policies are handled in the best industry practice.
  • Advanced Security Information and Event Management (SIEM) Technology --- TrustCSI™ MSS is built on a state-of-the-art correlation and classification SIEM engine. We trace billions of events daily and identify real threats timely and accurately for quick remediation actions, greatly reducing businesses’ time on analyzing and correlating the security logs.

SIEM Log Correlation and Classification Technology

1a. Raw event logs will be sent to CITIC Telecom CPC LEC for Filtering and Aggregation. They will then be passed to CITIC Telecom CPC SOCs.
1b. The Vulnerability Scanner will scan the selected assets periodically and deliver the scanning results which will be stored in the knowledgebase.
2. CITIC Telecom CPC SOCs will then make use of the SIEM (Security Information and Event Management) engine for the correlation and analysis between the meta-log and the knowledgebase. The correlated results will be classified in the appropriate category and attributed a risk level.
3. If CITIC Telecom CPC’s security specialists in the SOCs find out that the severity of the correlated event is higher than the level agreed with customers, they will activate the incident response mechanism. Customers can get a full picture on their security status through the dashboard.
4. Through the online TrustCSI™ MSS portal, customers not only obtain the latest RSS news feed all over the world, but also get a full picture on their security status in real time, including detailed security event handling information.

Related Products