Details about our smart SOC
Our technological principles
Principle 1: Make autonomous
To ensure our customers and partners using our platform are self-sufficient, we have developed simple and intuitive interfaces. Complexity is reserved for the engine; it must be transparent to users.
SOCRATE® has a wide range of tools to meet almost every situation and need, from intrusion testing to vulnerability scanning, application source code review, and database testing. This is our way of empowering you without the need to use external tools and thus losing the cohesion of results, the standardization of summary tables, and the reports produced. You maintain a 360° view.
If your teams aren't yet autonomous, rely on our MDR (Managed Detection and Response) service. We ensure gradual skill development at your pace through training and know-how transfer. And for clients who wish, our MDR experts take charge of their defenses, allowing them to focus fully on their core business.
Principle 2: Excellence
We strive for excellence. Our customers say our products perform very well, but we accept that others are better than us on certain technological building blocks. In this case, our agnostic platform allows their integration instead. This guarantees our customers are always using the best technologies available.
For example, vulnerability scanners. Everyone wants to be the world leader in the field. But who says it will remain so? What if number 3 takes pole position? Would that mean that the investment you made makes you more vulnerable now than the day you invested? The SOCRATE® choice is to offer the two or three best technological solutions on the market, to synthesize their results to guarantee you are always at the cutting edge of what is being done, at the price of a single solution. We are the only ones on the market to do this.
Principle 3: Facilitate your certification
Getting certified is a long and tedious process. The NIS 2 directive further increases these constraints.
Aware of these repetitive challenges (renewal of certifications), our reports provide the requested indicators and our dashboards are aligned with the standards to allow you to accelerate your compliance.
Principle 4: Stay Agile
SOCRATE® is a mix of OpenSource and commercial applications. The challenge was to be agnostic, with this permanent adaptability to the market but also to be multi-profile for better responsiveness between teams with
- a Manager view, so that management knows in real time the security level of its Information System
- an Expert view, so that cyber engineers can go further in their investigations during an attack (packet analysis, network analysis, etc.)
- a Cyber view to do daily work (vulnerability scans, remediation plan, etc.)
Scope covered by SOCRATE®
User position
Antivirus software on workstations is no longer sufficient.
We offer EDR or better XDR type solutions (to optimize investigations and response to threats, and to prioritize and connect events).
Cloud and SaaS Applications
The most delicate subject. Especially when using applications in the Public Cloud such as Office 365, Google Workplace, SalesForce...
In this case, almost all the SOCRATE® bricks must be activated to have a 360° view and protection:
solutions to inspect emails and other shared content, to detect malware, phishing content, data exfiltration attempts, and other threats. And you need to activate AccessProtect, a SOCRATE® innovation that allows for better control of access and flows.
Access
Identity and Access Management (IAM) is treated with great attention by SOCRATE®. Managing users and their authorizations in information systems is an important part of cybersecurity.
Databases
Who's surprised by a slowing database? We think it's overloaded, but perhaps it's an ongoing attack. Here too, SOCRATE® has tools specific to this type of detection.
SmartPhone
Smartphones are increasingly used today to connect to corporate applications. This is true for email, the contact database, and the calendar. But it's also increasingly true for accessing corporate applications.
SOCRATE® therefore had to also protect its customers' smartphone fleet.
Innovations
SOCRATE® contains a number of innovations: SOC Protect, DeviceData Protect, Access Protect. It is polymorphic, agnostic, capable of protecting its customers' assets from end to end by going beyond the current limits of flow analysis, behaviors and data capture.
Applications
Applications are vulnerable. When we gain access to the source code, we begin with a cyber audit of the code.
When the application is in production, agents will report any abnormal behavior. In addition, we collect its logs for detailed and ongoing analysis of its operation using an intelligent SIEM.
Network
SOCRATE® has several tools for cross-analyzing network data and detecting abnormal behavior. Our platform is agnostic and can interface with all your tools.
DataCenter
It's all at once: the network, access, containers, databases, applications...
Data centers that wish to equip themselves will have access to the entire range of SOCRATE® solutions to protect their entire infrastructure from floor to ceiling.
Container / VM
Container or VM, under Linux or Windows, all these strategic environments are monitored.
For example, SOCRATE® monitors the file system and identifies changes in file content, permissions, ownership, and attributes.
Its file integrity verification mode and Windows registry monitoring make it an essential partner.
IoT
Nothing escapes you: asset inventories, network visualization, configuration risks, etc.
AI
In the new version of SOCRATE®, artificial intelligence is no longer a technology added to process the masses of information collected.
It is now at the heart of our new foundation to overcome the limitations encountered and improve the quality of analysis, the precision of its results and speed.
AccessProtect®
Technology that is installed on top of applications.
Allows you to better control access to your Information System and flows.
DataProtect®
Technology that is installed on top of the data.
Protects your data while waiting for the security patch.
SOC Protect®
Protects your own SOC, the ultimate point of your Information System.
AI SOC®
Enables better performance thanks to native Artificial Intelligence, integrated into the heart of your SOC.
Back to the home page