We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept

High profile breaches are on the rise. Online communities are becoming more aware and additional compliance requirements make IT security everyone’s top priority. CITIC Telecom CPC TrustCSI™ Managed Security Services, which complement multiple Security Operations Centres (SOCs) with high availability and disaster recovery functionality, are designed to help you handle these increasing IT security demands effectively. Based on ISO27001-certified processes, we provide robust 24/7 monitoring and help businesses identify and analyse vulnerabilities, prioritize threats as well as refine security policies and processes.

SIEM Log Correlation and Classification Technology

Managed Security Services (MSS) Solutions Diagram

1a. Raw event logs will be sent to CITIC Telecom CPC LEC for Filtering and Aggregation. They will then be passed to CITIC Telecom CPC SOCs.

1b. The Vulnerability Scanner will scan the selected assets periodically and deliver the scanning results which will be stored in the knowledgebase.

2. CITIC Telecom CPC SOCs will then make use of the SIEM (Security Information and Event Management) engine for the correlation and analysis between the meta-log and the knowledgebase. The correlated results will be classified in the appropriate category and attributed a risk level.

3. If CITIC Telecom CPC’s security specialists in the SOCs find out that the severity of the correlated event is higher than the level agreed with customers, they will activate the incident response mechanism. Customers can get a full picture on their security status through the dashboard.

4. Through the online TrustCSI™ MSS portal, customers not only obtain the latest RSS news feed all over the world, but also get a full picture on their security status in real time, including detailed security event handling information.

Highlights

    • Dedicated Team of Security Professionals – Striving for service excellence, CITIC Telecom CPC security professionals are 100% certified with international security programs such as CISA, CISSP and CompTIA Security+. With CITIC Telecom CPC, organizations have access to the most skilful security experts in the APAC region, certified in a wide range of technologies.
    • World-class Security Operations Centres (SOCs) – CITIC Telecom CPC’s SOCs are certified with a series of international certifications, including ISO9001, ISO14001, ISO20000, ISO27017 and ISO27001 Information Security Management System. They also comply with ITIL processes, ensuring that TrustCSI™ MSS brings consistency in such a way that threats and policies are handled using the best industry practices.
    • Advanced Security Information and Event Management (SIEM) Technology – TrustCSI™ MSS is built on the basis of a state-of-the-art correlation and classification SIEM engine. We trace billions of events daily and identify real threats timely and accurately for quick remedial actions, greatly reducing time spent by businesses on analysing and correlating security logs.

Success Stories

G2000

G2000

G2000 deploys CITIC Telecom CPC's Managed Security Services to safeguard the customers data.

More

Blog

【Security Matters】Enhance Corporate Resilience with Red/Blue Cybersecurity Practice

【Security Matters】Enhance Corporate Resilience with Red/Blue Cybersecurity Practice

2023-09-27

Red/Blue Cybersecurity Practice is a comprehensive solution and an important strategy for maintaining cybersecurity in the digital era, strengthening defense against cyberattacks an…

More
【Defending Against Cyber Attacks】Understanding Emerging Trends in Threats to Enhance Enterprises' Cybersecurity

【Defending Against Cyber Attacks】Understanding Emerging Trends in Threats to Enhance Enterprises' Cybersecurity

2023-08-29

Modern businesses face substantial challenges from cyber attacks. Protecting against cybersecurity risks has become essential for enterprises of all sizes,. Let's incorporate a thor…

More
Embracing Intelligence Operations: The Promise and Security Perils of New Technologies

Embracing Intelligence Operations: The Promise and Security Perils of New Technologies

2023-08-10

The convergence of Operational Technology (OT) and Information Technology (IT) becomes the norm for manufacturers, however, it also introduces significant cybersecurity risks that m…

More
Exploring【CITIC Telecom CPC Cloud Data Center】Empowering Digital Intelligent Journey

Exploring【CITIC Telecom CPC Cloud Data Center】Empowering Digital Intelligent Journey

2023-07-14

To help customers discover new business possibilities and sustain market-leading advantage, we organized "Exploring CITIC, Beyond the Possibilities: Intelligent AR Data Center Tour"…

More
Holistic Cloud Management & Security in Cloudiverse

Holistic Cloud Management & Security in Cloudiverse

2023-07-11

Digital transformation has revolutionized business operations with multi-cloud strategy, offering enhanced business agility and efficiency. However, concerns such as resource alloca…

More
Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

2023-01-17

Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…

More
Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

2022-12-12

The fashion industry is entering a highway to a reshuffling and reshaping environment with the rapid development of the digital economy, the question is, how can the industry adapt …

More
CIE Golde: To Roof over Digitalization with Innovations

CIE Golde: To “Roof over” Digitalization with Innovations

2022-11-16

Interconnection in the digital era has brought together cross-regional online and offline businesses, facilitating the global business of enterprises, creating new opportunities and…

More

Related Products

Secure AI (UEBA)Secure AI (UEBA)

Secure AI (UEBA)

Traffic Monitor and Analysis

Network Traffic Analysis Network Traffic Analysis

Network Traffic Analysis

Traffic Monitor and Analysis

Endpoint Detection & Response (EDR)Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Threat Detection Services

Contact Us
Company Name:
Contact Name:
Title:
Contact Phone Number:

-

Email:
Remark

Please slide to verify

Products & Services
Europe Solutions Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +31 20 567 2000

Service Hotline +372 622 33 00

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Thank you for your enquiry.


We will contact you shortly.
Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue