Setup time can be quick. Some features, such as vulnerability scans, are operational within 48 hours.
The number of devices or their type (servers, workstations, IoT, smartphones, etc.) have an impact on the delivery time.
But automatic network discovery makes it fast.
The subscription depends on the number of devices to be protected. It also depends on the features you have selected.
More generally, it allows you to have a dedicated SOC, to which no other clients are connected, at the price of a shared SOC. Dedicated SOC offerings are very rare, but the trend is moving towards dedicated SOCs for obvious security reasons.
The first services delivered are vulnerability scans with synthetic dashboards and reports containing very precise remediation plans to save you time.
We operate on a best effort basis. We use every means to protect the entire information system entrusted to us.
We perform automated detection of flaws or vulnerabilities if it is not you or a partner who will do it with SOCRATE®.
When an attack is detected, the SOC will automatically take action to protect the targeted assets. If the customer wants it to be validated by a human beforehand, this is also possible.
In all cases, we are insured for this type of protection with the company Hiscox and we contractually pay financial compensation to our clients in the event of proven loss of business or damage suffered.
There is no minimum volume. There is also no maximum volume. SOCRATE is designed to manage a few dozen devices as well as several thousand.
Its design allows it to be scalable without losing performance.
Yes. But to find out exactly, just click on the request form.
You will be asked a number of questions which will allow us to answer you precisely.
Why is our SOC called SOCRATE®?
Socrates was a Greek philosopher of the 5th century BC, who became one of the most illustrious thinkers in history.
"Socrates' thinking begins with experience." He was renowned for helping people understand who they really were and how they functioned through his tools and methods (questioning, etc.).
Understanding how your information system works is also a key aspect of our SOC. Our tools help you understand its internal workings and make the right decisions.
Another reason for choosing this name is the Anglicism SOC rate. "Rate" as a "rating" tool that allows to rate, to evaluate the level of security of the Information System. The proposed indicators are aligned with the standards and allow us to bring our clients to the highest level of certification: NIS2 and ISO 27001.
5 major innovations make SOCRATE a latest generation SOC.
The dedicated SOC, the self-adaptation of the security perimeter based on the reality on the ground (discovery of new equipment, IoT, etc.) or the proactive dimension to protect data in the event of an attack (DeviceData Protect, SOC Protect) are part of these innovations.
Furthermore, SOCRATE® is an open platform. It allows partners to interface with it to benefit from the power of our intelligent engine, our upstream tools (collection, etc.) or downstream tools (reports, dashboards, etc.). This could be partners developing an application that only needs our flows collected from their customers... Our interfaces allow us to accept many scenarios, whether for the OpenSource community or for software publishers.
Do not hesitate to contact us.