KERUBIEL LTD. is based in Budapest, Hungary but operating on international level as well (Italy, Malta, UK, Singapore, etc.). We are providing special services and tailored solutions on Security, Cybersecurity and Privacy.
In the last 2 years KERUBIEL have been recognized and awarded on these fields by high profile Magazines (TOP10 CyberSecurity provider by CIO Bulletin, TOP10 GDPR Service provider by CIO Application Magazine, etc.).
It is worth to mention that due the increasing demand coming from the US market, a new company was established wearing the well branded name forming the KERUBIEL US. in last December, headquartered in Florida, US.
KERUBIEL offers several security solutions on Threat Intelligence and Security Operations as well.
SOC is a managed Cyber Security Operations Center which is suitable for all kind of organizations – we work with SMEs, large corporates, governmental and critical infrastructure organizations – regarldess of their size. SOC helps keeping your business information secure, as we provide a complex service package that covers all the necessary IT security tools, devices, technologies and knowledge. Our monthly fee structure provides a flexible and cost-effective solution as your company can reduce costs of IT security devices, licensing, deployment, training and continuous education of employees.
A Cyber Security Operations Center, or SOC is a dedicated IT security unit within the organization, with one primary task: to prevent and eliminate cyber-security incidents.
Our company’s SOC-as-a-Service package is specifically designed for infrastructures over 500 IPs. Whether it’s protecting a critical infrastructure or complex enterprise, government environment, our incident response team has specialized experience to provide for our clients. The primary mission of the SOC is to prevent, detect and handle cyber security incidents. Accordingly, many preventive controls should be implemented during the design phase to reveal and eliminate known attack paths. Blind spots are eliminated by a variety of technical and logical solutions, so detection capabilities will be more efficient, faster, and the time needed to investigate events will minimized.
Our CERT team has been certified by Carnegie Mellon University. Our incident response team is made up of four experts from different IT security fields who are simultaneously serving in the SOC. These areas consist of offensive security (ethical hacking), defensive security (log analytics), threat hunting and cyber threat intelligence (CTI). In addition, our network security and product-specific support staff are also available.
As part of market entry and digital marketing, we followed a 5-step methodology that consisted of the following elements:
1.COORDINATE YOUR BUSINESS GOALS
2. IDENTIFY YOUR TARGET GROUP AND YOUR COMPETITORS!
3. CHOOSE FROM THE SOCIAL MEDIA PLATFORMS AND SET UP YOUR PROFILES!
4. START SOCIAL MEDIA PLATFORMS!
In detail we have prepared a marketing strategy which consisted of several elements behind the standard social media possibilities. In the last year we have tripled our followers and tripled our newsletter subscribers as well. We are constatly providing digital content on several platforms especialy on Linkedin and in other digital media platforms as well like Prime Insights, CIO Applications Magazine, CIO Bulletin, The Silicon Review, etc.
Our SOC as a Service methodolgy
Assessment
Based on Crown Jewels analysis or, based on existing risk assessment, we conducting a technology survey of the security toolkit associated with the systems concerned to determine their effectiveness and maturity.
Detection capabilities
As a result of the assessment, we create a detection capability matrix using a “top to bottom” or “bottom to top” approach, that is, to either tailor technologies to business needs, or to align with the needed coverage requirements based on available technologies and their maturity.
Hardening
With hardening, the systems’ exposure to cyberattacks and vulnerabilities can be substantially reduced.
SIEM (Security Incident and Event Management) implementation
The purpose of SIEM and similar systems is essentially to centrally store and analyze logs (events) and any security relevant data from hardware and software devices, operating systems, applications to ensure that security-threatening events, malicious acts are discovered. For a list of our supported SIEM systems, see the portfolio of our VAR division.
Use Cases
Use Cases (and related playbooks) means planned reactions and sequences of alarms that indicate a cyber-security incident and require immediate human or automated intervention. Our company has over 100 unique Use Cases that can be customized and also automated with a SOAR platform.
Triage
We define in the Use case matrix and the associated command register, together with IT security and operation stakeholders. the steps, actions, specific commands, queries that can be performed outside the SIEM system but on the connected data sources in case if further validation or more data is needed.
Monitoring
Our dedicated incident management (CSIRT) team is organized on three levels (L1-L3) and available 24/7/365 for effective IT security oversight and responsiveness. We provide 99.9% * availability for the devices we integrate and manage.
Reports and trackback
Incident management and reporting is provided by a framework that adapts to the customer’s technological and administrative capabilities. Regular reports, technical and executive reports on the performance and quality of the service provide a comprehensive overview.
Lessons learned
There may be cases for which there is no Use Case or so far unknown, and therefore we must update the rules, preventive and detective controls, and service defining documents to detect and respond to similar events in the future.
Law Enforcement
We can make our data collection and development capabilities and experience available to state bodies with special needs and authorization in order to enhance or entirely carry out their effective law enforcement activities.
In the last 2 years KERUBIEL have been recognized and awarded on these fields by high profile Magazines (TOP10 CyberSecurity provider by CIO Bulletin, TOP10 GDPR Service provider by CIO Application Magazine, etc.).
It is worth to mention that due the increasing demand coming from the US market, a new company was established wearing the well branded name forming the KERUBIEL US. in last December, headquartered in Florida, US.
KERUBIEL earned several international awards in the last years like we mentioned above. More details: https://kerubiel.com/en/publications/
Certifications of our Staff
CEH, OSCP, CISA, CISM, ISO27001 lead auditor,
CISA (Certified Information Systems Auditor),
CISM (Certified Information System Manager),
CGEIT (Certified in Governance of Enterprise IT),
CRISC (Certified in Risk and Information Systems Control),
CISSP (Certified Information Systems Security Professional),
CEH (Certified Ethical Hacker),
OSCP (Offensive Security Certified Professional),
C|CISO (Certified Chief Information Security Officer),
OSCE (Offensive Security Certified Expert),
CSA (Certified Security Analyst),
CCSE (Checkpoint Certified Security Expert),
OSA (Oracle Certified Associate),
MCDBA (Microsoft Certified DBA),
MCSE Security (Microsoft Certified System Engineer – Security plus),
Certified Expert witness (DS, ICT).
Our SOC is operating non-stop 7/24/365 with 99,99% service availability thanks to redundant solutions.
Cyber Threat Intelligence resources help our work to control events in a richer context, thereby reducing the number of false-positive alerts.