Overview
- Assessment
- Security Operations Assessment
Features: This service combines a diagnostic engine that visualizes the progression of attacks using the MITRE ATT&CK framework with expert re-evaluation. It provides a comprehensive analysis to identify weaknesses in an organization's security operations.
- Operational Structure Building & Improvement Advisory
Features: Utilizing ITU-T Recommendation X.1060, this advisory service offers a bird's-eye view of an organization's security operational structure. It helps identify issues, proposes concrete improvements, and supports their implementation.
- Detection
- Smart Log Analysis
Features: Using an automated analysis tool called SOLOBAN, this service monitors logs while suppressing false positives. It visualizes and reports threats based on their progression level, making it easier to understand the situation.
- Hunting
Features: Our expert analysts proactively deep-dive into logs to detect unknown threats that might be missed by standard monitoring systems.
- Prevention
- Smart Blocking
Features: When a critical attack is detected, this service immediately applies a block setting to the relevant security product to prevent further damage.
- Cyber Prevention
Features: Based on proprietary threat intelligence and discoveries by white-hat hackers, this service automatically distributes unique defense signatures.
- Cyber Prevention Custom
Features: This service provides a higher level of defense by creating and applying customized signatures tailored to the client's specific environment.
- Support
- Second Opinion
Features: Expert analysts provide objective advice by analyzing data across other SOC services, SIEM (Security Information and Event Management) tools, and logs. This service can be used in conjunction with other offerings.
- SOC Training
Features: We support the development of security analysts through training that includes CTF (Capture The Flag) exercises and written materials. We also provide analytical know-how and offer support through a portal for ongoing skill improvement.
Target Product (EDR) : CrowdStrike Falcon
✅ Real-time endpoint monitoring and high-precision threat detection powered by Ierae’s proprietary SIEM platform “SOROBAN”
✅ Ierae’s SOC collects alerts and process logs from Falcon to: ・ Perform advanced threat identification using proprietary detection signatures ・ Execute automated threat containment through Smart Blocking This integration enables maximum utilization of Falcon’s capabilities in a comprehensive SOC monitoring environment.
✅ Falcon’s Next-Gen SIEM functionality also allows for proactive threat hunting by analysts
Highlights
- 1. Monitor – 24/7 Continuous Threat Monitoring Proprietary log analytics engine “SOLOBAN” enables smart, real-time log analysis Minimized false positives through intelligent alerting Proactive threat hunting performed by certified analysts
- 2. Defend – Smart Blocking & Threat Prevention Automated response and containment upon critical threat detection Continuous distribution of proprietary threat signatures Custom signature development tailored to the client’s unique environment
- 3. Assess – Security Posture Evaluation & Improvement MITRE ATT&CK-based simulation and visibility mapping Security framework consulting using international standards (e.g. ITU-T X.1060)
Details
Unlock automation with AI agent solutions

Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
For information about product support, please visit: https://gmo-cybersecurity.com/service/soc/
For inquiries, please contact us at the following: ml-soc-wafaid@gmo-cybersecurity.com
Software associated with this service

