Introduction to service

Introduction to service

The World Wide Web's reach and the prevalence of network environments has opened the doors to new threats from hacks, cyberattacks, phishing, probes, viruses, worms, and spy software. And with the advance of technology,

Learn more

Features and strengths

Cooperative contracts for evaluation and benefits

Possesses information security competence and ability. It integrates across R&D, praxis, technical ability, and is able to supply testing in advance, monitoring during, and review after an event. Such one-stop service fulfils the needs of both government and corporate customers

Learn more

The latest global information is provided in real time

Cooperates with multiple vendors foreign and domestic. Provides the customer with the latest information so that they can control risk from information security

Learn more

Ample experience and ability in information security

Information security monitoring deployment is simplified, and the most optimal solution, notification, handling, and procedures are chosen for each information security event

Learn more

Information security smart service web

The smart service web provides the customer with information security risk indicators and reporting follow-up management for all information security events. Monitoring and analysis reports are produced regularly, so that the customer can understand their information security status.

Go now

Description of service

Description of service

The information security service team provides professional security and monitoring services across three aspects: people, products, and processes. The team is capable of effectively managing organizational information security of products, network equipment, user equipment, and possible CIA content within the system. With its 24-hr maintenance, it can monitor, test, and discover possible events.

Service method

Service method

Through incorporation of the firewall, invasion prevention systems, WAF, antivirus systems, EDR, Network Detection&Response (NDR), DLP, and other information security equipment, and operation system logs that are sent back to the SOC for multiple-variate analysis, the team can identify information security events, warnings, and abnormal connections. If a information security event is identified, the target is notified by email and SMS so that timely response can be made. The information security smart entrance website can completely and regularly produce monitoring and statistical analysis reports so that the customer can completely understand their information security status.

Service processes

Service processes

If a information security event is identified, the target is notified by email and SMS so that timely response can be made. The information security smart entrance website can completely and regularly produce monitoring and statistical analysis reports so that the customer can completely understand their information security status.

Service types and benefits

Cloud SOC monitoring services
(Commissioned monitoring services)

Incorporates fast, cost-effective, suitable information security personnel for companies with limited budgets and human resources.

All-year-round information security monitoring for equipment

Uses a firewall, IDS/IPS, Web AP Firewall, antivirus central control, as well as Syslog, SNMP, SMTP, and other special methods to log events, and then proactively or passively sends the logs to the CHTSEC SOC for analysis by the monitoring system, 24-7-365 information security monitoring; when suspicious network events are discovered, the customer is immediately contacted.

Customer-end SOC services

Customer-end SOC services

SOC system and mechanisms are built into the company's internal network through Chunghwa Telecom's international information security. In addition, proper education and training is implemented so that the customer can maintain the system on their own, with high levels of agility, budgeting, and human resources. The customer can maintain the 5x8 system on its own; while at the same time HiNet SOC provides 24-7-365 information security monitoring. When suspicious events are discovered, the customer is notified immediately.

Information security smart service web

The smart service web provides the customer with information security risk indicators and reporting follow-up management for all information security events. Monitoring and analysis reports are produced regularly, so that the customer can understand their information security status.

Go now

Cooperative contracts for evaluation and benefits

Possesses information security competence and ability. It integrates across R&D, praxis, technical ability, and is able to supply testing in advance, monitoring during, and review after an event. Such one-stop service fulfils the needs of both government and corporate customers.

The latest global information is provided in real time

  • Cooperates with multiple vendors foreign and domestic. Provides the customer with the latest information so that they can control risk from information security
  • Chinese-based report information
  • First-hand backbone-end malicious attack reports: Malicious IP, URL, files, and programs, and malicious program information from important hacker forums and news sources
  • Information security weaknesses analysis report; information security weaknesses information
  • Possesses ample information on international information security

Ample experience and ability in information security

Our information security team has earned multiple awards and has years of experience in service; it is very versatile in the practical operations of SOC

With ample real-world experience and ability in information security testing, it also incorporates a knowledgebase that helps ensure project quality

Complete digital data collection, preservation, and management to ensure that data has evidentiary power

It is a vendor that possesses real-world SOC maintenance, with multiple Success Cases both domestically and overseas, in government, finance, and private companies

Information security monitoring deployment is simplified, and the most optimal solution, notification, handling, and procedures are chosen for each information security event

Possesses a complete competence training program and development of technical ability. It can continually upgrade its testing abilities and has a deep understanding of information security

The senior detection team can search out the root causes of information security events

  • We have built a information security event detection lab, which has obtained ISO17025 for testing and calibration laboratories
  • Possesses large scale testing ability for the host-end
  • An excellent definition and analysis of malicious programs
  • Extremely proficient with event logs, operating system artifacts, and network packet analysis
  • Detection result feedback is used to engage in collective defense for information security

Information security smart service web

The smart service web provides the customer with information security risk indicators and reporting follow-up management for all information security events. Monitoring and analysis reports are produced regularly, so that the customer can understand their information security status.

Go now