Compliance - Monitoring - Threat Detection - Incident Response

Hackers Don't Sleep

What We Do
about hawk

HawkEye

HAWKEYE Managed SOC powered by DTS Solution helps your organization strategize, develop, build and manage a Next Generation Security Operations Center – SOC 2.0 As A Service to protect your information assets whilst counteracting the ever changing threat landscape.

Our state-of-the-art HAWKEYE Cyber Security Operations Center (CSOC) can act as your eyes and ears, to provide the necessary visibility you need without having to develop and build cyber capabilities so that you can focus on your core business.

HAWKEYE Cyber Security Operations Center (CSOC) powered by DTS Solution is based out of Dubai, United Arab Emirates (UAE) covering the Middle East and Africa regions.

Machine Learning

Machine Learning

Machine Learning enabled SOC As A Service
– HAWKEYE

Managed Security Analytics

Managed Security Analytics

Underlying Platform is based on Elastic
– Big Data Security Analytics

Managed SOC Powered by DTS

Managed SOC Powered by DTS

HAWEYE SOC As A Service is powered by DTS
– Cyber Security Experts

In-house Experts

In-house Experts

Integrated Approach of leveraging In-house
Red and Blue Teams

Get in touch with us!
about hawk
Hackers Don’t Sleep, Neither Do We.
Hunting Cyber Adversaries With HawkEye
Powered by DTS Solution - Cyber Security Redefined
features

Key Features

HAWKEYE Managed SOC Provider can be your trusted security partner with experience across the field to support your goal and provide the required managed security services capability.

We believe HAWKEYE Managed CSOC as a Service powered by DTS is best placed to support you through the SOC setup and continuous operations.

REAL-TIME MONITORING

  • Proactive to Predictive Security Monitoring
  • Security Events and Log Correlation
  • Deep Security Analytics
  • Machine Learning Driven CSOC
  • Managed Detection and Response

OPERATIONAL COMPLIANCE

  • Compliance Monitoring
  • Hardening Policy Compliance
  • Security Auditing
  • Change Management Monitoring
  • Configuration Management

THREAT MANAGEMENT

  • Threat Hunting as a Service
  • Vulnerability Management
  • Threat Adversary Detection
  • Use Case Development
  • Threat Intelligence
  • Managed Detection and Response

INCIDENT MANAGEMENT

  • Incident Notification and Response
  • Security Incident Severity Rating
  • Incident Response Triage
  • Security Automation
  • Security Orchestration
  • Incident Digital Playbooks
features
features

OPERATION MODEL

Outsourced Remote Monitoring – Managed / Hybrid
(On-premise SIEM)

Staff Augmentation
(Dedicated and onshore)

Staff Augmentation
(Shared and offshore)

Remote Monitoring

Ideal for organizations that already have an on-premise SIEM platform and need support cyber security operations, in managing the SIEM platform through staff augmentation in a dedicated, shared, onshore and offshore model.
  • 8 x 5 with HawkEye on screen coverage
  • 24 x 7 with HawkEye on screen coverage
  • Cyber Threat Monitoring as a Service
  • Log Source Integration
  • SIEM Health-Check
  • Log Retention Management
  • Events Per Second (EPS) Monitoring
  • SOC Dashboards
  • Standard Use Cases Reports
  • Customized Use Cases Reports
  • Threat Intelligence
  • Managed Vulnerability Assessment
  • Managed Penetration Testing
  • Call Center Support

SOC-as-a-Service – Managed / Hybrid
(Off-premise SIEM)

SOC-as-a-Service
(Shared Multi-Tenant SIEM Platform)

SOC-as-a-Service
(Dedicated SIEM Platform)

Lite

Bronze

Suitable for organizations that need to monitor the Internet Perimeter. Ideal for SMEs that need to outsource security monitoring services.

Baseline

Silver

Suitable for organizations that need to monitor internet perimeter and critical systems. Ideal for SMEs that need to outsource security monitoring services.

Advanced

Gold

Ideal for organizations that need to monitor the IT systems. Ideal for large organizations that need to outsource security monitoring services that involves an internal team.

Premium

Platinum

Ideal for organizations that need to monitor the internet perimeter. Ideal for large organizations that need to augment security monitoring services with their internal IT security and operations team.
features
packages

Soc As A Service Packages

We have prepared our subscription packages in four tiers to accommodate varying cyber risk levels posed to your organization, budgets and business requirements to ensure cyber resiliency.

24 x 7 support, active threat monitoring and access to customized use case reports are included in Premium. Get started today.

Lite

Bronze
Suitable for organizations that need to monitor the Internet Perimeter. Ideal for SMEs that need to outsource security monitoring services.
  • 5 Log Source Integration (Maximum)
  • 250 Events Per Second (EPS)
  • 5 Standard Use Case Reports
  • Event Log Receiver / Collector (Hawkeye Cloud)
  • 8 x 5 Security and Threat Monitoring Team
  • 8 x 5 Email Support
  • 8 x 5 Security Vulnerability and Threat Management Team
  • 8 x 5 Service Integration Team (Log Integration)

Baseline

Silver
Suitable for organizations that need to monitor internet perimeter and critical systems. Ideal for SMEs that need to outsource security monitoring services.
  • 15 Log Source Integration (Maximum)
  • 3 Months of Online Log Retention
  • 500 Events Per Second (EPS)
  • SOC Dashboard Access (Multi-Tenancy / RBAC)
  • 10 Standard Use Case Reports
  • Event Log Receiver / Collector (Hawkeye Cloud)
  • 24 x 7 Security and Threat Monitoring Team
  • 24 x 7 Call Center Support
  • 8 x 5 Service Integration Team (Log Integration)
  • 8 x 5 Security Vulnerability and Threat Management Team

Premium

Platinum
Ideal for organizations that need to monitor the internet perimeter. Ideal for large organizations that need to augment security monitoring services with their internal IT security and operations team.
  • 50 Log Source Integration (Maximum)
  • 3 Months of Online Log Retention
  • 2000 Events Per Second (EPS)
  • SOC Dashboard Access (Multi-Tenancy / RBAC)
  • 30 Standard Use Cases Reports
  • 10 Customized Use Cases Reports
  • Event Log Receiver / Collector (Hawkeye Cloud)
  • 24 x 7 Security and Threat Monitoring Team
  • 24 x 7 Call Center Support
  • 8 x 5 Service Integration Team (Log Integration)
  • 8 x 5 Service Integration Team (Use Case Dev.)
  • 8 x 5 Security Vulnerability and Threat Management Team

Which service is right for you?
Contact us to arrange a half day Managed SOC workshop in Dubai.

packages
capabilities

Threat Analytics Capabilities

PERIMETER MONITORING
NETWORK SECURITY
SYSTEMS SECURITY
APPLICATION SECURITY
DATABASE SECURITY
ENDPOINT SECURITY

IDENTITY AND ACCESS CONTROL
MALWARE HUNTING
VULNERABILITY MANAGEMENT
CLOUD SECURITY MONITORING
THREAT INTELLIGENCE
VULNERABILITY DISCLOSURES
MANAGED DETECTION AND RESPONSE

capabilities
process

The Process

We will perform an onsite discovery workshop with the customer to understand the current inherent risk profile based on a series of questions that has been designed to understand current maturity, threat level, exposure and organizational and business value.

The score is then bench-marked across our recommended package matrix to define which service model would be the most appropriate based on the inherent risk profile and types of advanced cyber security monitoring services required.

on-boarding

SECURE ON-BOARDING

soc-as-a-service

SERVICE DELIVERY

secure-off-boarding

SECURE OFF-BOARDING

process


CONTACT US

We welcome you to contact us for more information
about HAWKEYE - SOC As A Service.