We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I acceptTurvaintsidente ja lekkeid juhtub üha sagedamini. Teadlikkus on tõusnud ning kehtestatud on täiendavaid normatiivseid nõudmisi, mistõttu on IT turve prioriteediks kõigile. CITIC Telecom CPC TrustCSI™ hallatavad turbelahendused, milles on kasutusel mitu kõrgkäideldavat ja avariitaastega varustatud infoturbekeskust, aitavad teil edukalt aina kasvavatele IT turbe nõudmistele vastata. ISO27001 sertifikaat näitab, et suudame tagada 24X7 monitooringu võimekuse ning aidata ettevõtetel leida üles nõrgad kohad ning neid analüüsida, samuti prioritiseerida ohtusid ja lihvida turbepoliitikat ning -protsesse.
Step 1: Data Collection for Customer Security Analysis
1a. Raw event data will be sent to CITIC Telecom CPC's local event data collectors for filtering and then forwarded to CITIC Telecom CPC Security Operations Centers (SOCs).
1b. Threat intelligence, vulnerability information, and industry security information will be gathered from third-party intelligence providers.
1c. Utilizing AI Platform to quickly compare against CITIC Telecom CPC's internal records and consolidate the customer's historical security alerts, reports, key asset inventory, and risk assessment reports.
Step 2: Security Analysis Execution
2. Leveraging the integration of SIEM-MiiND and AI LLM, the CITIC Telecom CPC SOCs will utilize AI LLM to thoroughly analyze the collected information and intelligence. Combining this analysis with the customer's actual risk exposure surface will allow for the identification of potential attack vectors.
Step 3: Security Service Content Output
3. Various security service content will be generated via AI LLM, including but not limited to penetration testing cases, real-time monitoring results, security analysis reports, and responses to customer inquiries.
Step 4: Standardized Deliverables
4. After review by the CITIC Telecom CPC SOCs, the generated security service content will be delivered to the customer according to their subscribed service delivery method, language preferences, and in accordance with the TrustCSI™ service level agreement (SLA).
Recently, China Entercom joined hands with Marriott International to hold the Marriott Asia Pacific IT Technology Innovation Exchange Conference, to empowers the digital transformation for Marriott International.
Rohkem
2024-12-20
This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…
2024-08-20
Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…
2024-07-26
Recently, a hacker group claimed to have successfully breached the internal systems of an internationally renowned film production company, stole more than 1TB of data from its inte…
2023-09-27
Red/Blue Cybersecurity Practice is a comprehensive solution and an important strategy for maintaining cybersecurity in the digital era, strengthening defense against cyberattacks an…
2023-08-29
Modern businesses face substantial challenges from cyber attacks. Protecting against cybersecurity risks has become essential for enterprises of all sizes,. Let's incorporate a thor…
2023-08-10
The convergence of Operational Technology (OT) and Information Technology (IT) becomes the norm for manufacturers, however, it also introduces significant cybersecurity risks that m…
2023-07-14
To help customers discover new business possibilities and sustain market-leading advantage, we organized "Exploring CITIC, Beyond the Possibilities: Intelligent AR Data Center Tour"…
2023-07-11
Digital transformation has revolutionized business operations with multi-cloud strategy, offering enhanced business agility and efficiency. However, concerns such as resource alloca…
2023-01-17
Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…
2022-12-12
The fashion industry is entering a highway to a reshuffling and reshaping environment with the rapid development of the digital economy, the question is, how can the industry adapt …
2022-11-16
Interconnection in the digital era has brought together cross-regional online and offline businesses, facilitating the global business of enterprises, creating new opportunities and…

Endpoint Detection & Response (EDR)
Threat Detection Services
Üldtelefon:
+3726223399
Müük:
+3726223360
Tehniline abi +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited
Täname Teid päringu eest.













