{"id":6345,"date":"2025-04-22T09:13:23","date_gmt":"2025-04-22T08:13:23","guid":{"rendered":"https:\/\/www.s3kgroup.it\/?page_id=6345"},"modified":"2025-04-30T13:55:02","modified_gmt":"2025-04-30T13:55:02","slug":"soc-security-operation-center","status":"publish","type":"page","link":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/","title":{"rendered":"SOC &#8211; Security Operation Center"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6345\" class=\"elementor elementor-6345 elementor-5409\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63ea2697 e-flex e-con-boxed e-con e-parent\" data-id=\"63ea2697\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-10a3367f e-con-full e-flex e-con e-child\" data-id=\"10a3367f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d01be95 elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"d01be95\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.s3kgroup.it\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1689994a elementor-widget elementor-widget-heading\" data-id=\"1689994a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">SOC - Security Operation Center<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50efdb50 e-con-full e-flex e-con e-child\" data-id=\"50efdb50\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d4c7d96 elementor-widget elementor-widget-image\" data-id=\"7d4c7d96\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"768\" src=\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg\" class=\"attachment-medium_large size-medium_large wp-image-1017\" alt=\"\" srcset=\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg 768w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-300x300.jpg 300w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-1024x1024.jpg 1024w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-150x150.jpg 150w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-1536x1536.jpg 1536w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-700x700.jpg 700w, https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1.jpg 1588w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-110bec1 e-flex e-con-boxed e-con e-parent\" data-id=\"110bec1\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b875d5e e-con-full e-flex e-con e-child\" data-id=\"b875d5e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0cfe234 e-con-full e-flex e-con e-child\" data-id=\"0cfe234\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b10e05 elementor-widget elementor-widget-heading\" data-id=\"9b10e05\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">SOC<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fc4273 e-con-full e-flex e-con e-child\" data-id=\"0fc4273\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1fd12b1 elementor-widget elementor-widget-text-editor\" data-id=\"1fd12b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A <strong>support<\/strong> in making choices and an <strong>interface<\/strong> to the world of security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2376226 e-con-full e-flex e-con e-child\" data-id=\"2376226\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2fdd9d elementor-widget elementor-widget-text-editor\" data-id=\"d2fdd9d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">A SOC is a facility that monitors the security status of IT of a company or more companies in the case that the SOC.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f506420 elementor-widget elementor-widget-text-editor\" data-id=\"f506420\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Within the SOC, people and technologies and processes have the task of keeping under control what happens in data traffic, to prevent incidents due to attacks that target IT resources and staff, whether they are in the company or on the move.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72134aa elementor-widget elementor-widget-text-editor\" data-id=\"72134aa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>For medium and small companies the use of SOC is recommended as a service included among the managed security services of an external provider.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4c26ca e-con-full e-flex e-con e-child\" data-id=\"d4c26ca\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c31c99 elementor-widget elementor-widget-text-editor\" data-id=\"6c31c99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The increase in the attack surface due to smart working, the cloud, hyperconnectivity and new work tools have generated a significant increase in risk exposure which needs to be managed by prevention rather than by an after-care approach.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e5391b7 e-flex e-con-boxed e-con e-parent\" data-id=\"e5391b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-442e9d2 e-con-full e-flex e-con e-child\" data-id=\"442e9d2\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f56a7d elementor-widget elementor-widget-text-editor\" data-id=\"4f56a7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6 class=\"p1\"><strong>What services do we offer?<\/strong><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8bdd6d0 elementor-widget elementor-widget-text-editor\" data-id=\"8bdd6d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our expert services are divided into:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b61f08e e-grid e-con-full e-con e-child\" data-id=\"b61f08e\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3a98e20 e-con-full e-flex e-con e-child\" data-id=\"3a98e20\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e4ea02 elementor-widget elementor-widget-heading\" data-id=\"9e4ea02\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Awareness<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b04e082 elementor-widget elementor-widget-text-editor\" data-id=\"b04e082\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>giving prominence to training personnel on security issues so they can deal with them effectively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47daa2d e-con-full e-flex e-con e-child\" data-id=\"47daa2d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b78f888 elementor-widget elementor-widget-heading\" data-id=\"b78f888\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e201722 elementor-widget elementor-widget-text-editor\" data-id=\"e201722\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">This covers the three areas of IT, namely:<\/p><ul><li><strong>Cyber Threat Intelligence (CTI)\u00a0<\/strong>,\u00a0which is evidence-based knowledge;<\/li><li><strong>Tactical CTI<\/strong>, entailing the use of technical information and IOC to identify the threat.<\/li><li><strong>Operational CTI<\/strong>,\u00a0seeking to describe the motivations and capabilities of attackers.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc09111 e-con-full e-flex e-con e-child\" data-id=\"dc09111\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22097e3 elementor-widget elementor-widget-heading\" data-id=\"22097e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Monitoring and Anomaly Detection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6cab47 elementor-widget elementor-widget-text-editor\" data-id=\"c6cab47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This service detects events with behavior that deviates from the \u201cnorm\u201d, using specific computational algorithms to highlight significant and appreciable deviations from the norm.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a75e0e8 e-con-full e-flex e-con e-child\" data-id=\"a75e0e8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4284dc4 elementor-widget elementor-widget-heading\" data-id=\"4284dc4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VA\/PT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c47f944 elementor-widget elementor-widget-text-editor\" data-id=\"c47f944\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security checks carried out periodically on the Client\u2019s infrastructure by means of an \u201cappliance\u201d provided by S3K and connected to the LAN. Our virtual Team of ethical hackers undertakes black or white box security audits according to the agreements and NDAs signed with the client.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4e79099 e-con-full e-flex e-con e-child\" data-id=\"4e79099\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-766b7ff elementor-widget elementor-widget-heading\" data-id=\"766b7ff\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Handling<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a67b3f3 elementor-widget elementor-widget-text-editor\" data-id=\"a67b3f3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This service addresses Cyber Security incidents in the ICT environment with potential impacts requiring specialist analysis skills.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc95041 e-con-full e-flex e-con e-child\" data-id=\"dc95041\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-68c4462 elementor-widget elementor-widget-heading\" data-id=\"68c4462\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Digital Forensic<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730dff8 elementor-widget elementor-widget-text-editor\" data-id=\"730dff8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Technical and Legal support in the Cyber Security field for the analysis and forensic management of Security events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-74a338d e-con-full e-flex e-con e-child\" data-id=\"74a338d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0527ae0 elementor-widget elementor-widget-heading\" data-id=\"0527ae0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End Point Security &amp; Priviledge Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f16bbf elementor-widget elementor-widget-text-editor\" data-id=\"8f16bbf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Management of security of enterprise endpoint\/server equipment. The Privilege Management service is geared towards managing external access of privileged accounts to business-critical servers\/systems.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0c7f70 e-con-full e-flex e-con e-child\" data-id=\"f0c7f70\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f74195d elementor-widget elementor-widget-heading\" data-id=\"f74195d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Forensic Analysis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-942c2b2 elementor-widget elementor-widget-text-editor\" data-id=\"942c2b2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To fully understand threats before they become security events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cebfbb5 e-con-full e-flex e-con e-child\" data-id=\"cebfbb5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6cab5f elementor-widget elementor-widget-heading\" data-id=\"a6cab5f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Early Warning<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aa33cc elementor-widget elementor-widget-text-editor\" data-id=\"0aa33cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This service provides an early warning of a possible vulnerability in the system before it is detected by Vulnerability Assessment (VA).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47673d0 e-flex e-con-boxed e-con e-parent\" data-id=\"47673d0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-fc82e2e e-con-full e-flex e-con e-child\" data-id=\"fc82e2e\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c3b3eef e-con-full e-flex e-con e-child\" data-id=\"c3b3eef\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c41e41f elementor-widget-mobile__width-initial elementor-widget elementor-widget-image\" data-id=\"c41e41f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"157\" height=\"147\" src=\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/04\/S3K-scudo.svg\" class=\"attachment-large size-large wp-image-3032\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0365220 e-con-full e-flex e-con e-child\" data-id=\"0365220\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7e2680 elementor-widget elementor-widget-text-editor\" data-id=\"c7e2680\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Security by design,<\/strong>\u00a0the design of new digital experiences and systems by risk-assessment and the integration of security features from the outset should become a foundational paradigm of a business, just as much as a culture of security should be instilled in the company itself, ranging from staff to suppliers to external contractors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fbf53d e-flex e-con-boxed e-con e-parent\" data-id=\"5fbf53d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-efb4958 e-con-full e-flex e-con e-child\" data-id=\"efb4958\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d90e66d e-con-full e-flex e-con e-child\" data-id=\"d90e66d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44c0dee elementor-widget elementor-widget-heading\" data-id=\"44c0dee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">SOC<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-307a935 e-con-full e-flex e-con e-child\" data-id=\"307a935\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7facd6 elementor-widget elementor-widget-text-editor\" data-id=\"c7facd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 class=\"p1\">What makes our company unique?<\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cea5d07 e-con-full e-flex e-con e-child\" data-id=\"cea5d07\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cd28e8 elementor-widget elementor-widget-text-editor\" data-id=\"4cd28e8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, the SOC solution proposed by SK3 is a point of reference for its customers<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e19f98c elementor-widget elementor-widget-text-editor\" data-id=\"e19f98c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">It is an interface to an all-encompassing security environment; not just a service centre, but more importantly a centre of expertise that is always up-to-date, on high alert, and in constant contact with national and international entities that play a role in security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0364175 elementor-widget elementor-widget-text-editor\" data-id=\"0364175\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is the focal point: in fact, risks in the banking world may vary to those in the world of health professionals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>SOC &#8211; Security Operation Center SOC A support in making choices and an interface to the world of security A SOC is a facility that monitors the security status of IT of a company or more companies in the case that the SOC. Within the SOC, people and technologies and processes have the task of [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":6329,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6345","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SOC - Security Operation Center - S3K<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC - Security Operation Center - S3K\" \/>\n<meta property=\"og:description\" content=\"SOC &#8211; Security Operation Center SOC A support in making choices and an interface to the world of security A SOC is a facility that monitors the security status of IT of a company or more companies in the case that the SOC. Within the SOC, people and technologies and processes have the task of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/\" \/>\n<meta property=\"og:site_name\" content=\"S3K\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T13:55:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/\",\"url\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/\",\"name\":\"SOC - Security Operation Center - S3K\",\"isPartOf\":{\"@id\":\"https:\/\/www.s3kgroup.it\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg\",\"datePublished\":\"2025-04-22T08:13:23+00:00\",\"dateModified\":\"2025-04-30T13:55:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage\",\"url\":\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg\",\"contentUrl\":\"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.s3kgroup.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What we do\",\"item\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Competences\",\"item\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Security\",\"item\":\"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"SOC &#8211; Security Operation Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.s3kgroup.it\/en\/#website\",\"url\":\"https:\/\/www.s3kgroup.it\/en\/\",\"name\":\"S3K\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.s3kgroup.it\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOC - Security Operation Center - S3K","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/","og_locale":"en_US","og_type":"article","og_title":"SOC - Security Operation Center - S3K","og_description":"SOC &#8211; Security Operation Center SOC A support in making choices and an interface to the world of security A SOC is a facility that monitors the security status of IT of a company or more companies in the case that the SOC. Within the SOC, people and technologies and processes have the task of [&hellip;]","og_url":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/","og_site_name":"S3K","article_modified_time":"2025-04-30T13:55:02+00:00","og_image":[{"url":"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/","url":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/","name":"SOC - Security Operation Center - S3K","isPartOf":{"@id":"https:\/\/www.s3kgroup.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage"},"image":{"@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg","datePublished":"2025-04-22T08:13:23+00:00","dateModified":"2025-04-30T13:55:02+00:00","breadcrumb":{"@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#primaryimage","url":"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg","contentUrl":"https:\/\/www.s3kgroup.it\/wp-content\/uploads\/2025\/02\/car1-768x768.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/soc-security-operation-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.s3kgroup.it\/en\/"},{"@type":"ListItem","position":2,"name":"What we do","item":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/"},{"@type":"ListItem","position":3,"name":"Competences","item":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/"},{"@type":"ListItem","position":4,"name":"Cyber Security","item":"https:\/\/www.s3kgroup.it\/en\/what-we-do\/competences\/cyber-security\/"},{"@type":"ListItem","position":5,"name":"SOC &#8211; Security Operation Center"}]},{"@type":"WebSite","@id":"https:\/\/www.s3kgroup.it\/en\/#website","url":"https:\/\/www.s3kgroup.it\/en\/","name":"S3K","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.s3kgroup.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/pages\/6345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/comments?post=6345"}],"version-history":[{"count":7,"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/pages\/6345\/revisions"}],"predecessor-version":[{"id":6352,"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/pages\/6345\/revisions\/6352"}],"up":[{"embeddable":true,"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/pages\/6329"}],"wp:attachment":[{"href":"https:\/\/www.s3kgroup.it\/en\/wp-json\/wp\/v2\/media?parent=6345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}