[vc_section css=”.vc_custom_1646121983724{background: #0a2044 url(https://infrasec.proxsisgroup.com/wp-content/uploads/2022/03/Headline-Background.jpg?id=1837) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_row css=”.vc_custom_1575622492915{padding-top: 120px !important;padding-bottom: 100px !important;background-color: rgba(10,32,68,0.7) !important;*background-color: rgb(10,32,68) !important;}”][vc_column width=”1/2″][vc_empty_space height=”20px”][vc_custom_heading text=”Security Operation Center” font_container=”tag:h2|font_size:4rem|text_align:left|color:%23ffffff|line_height:1″ use_theme_fonts=”yes” css_animation=”fadeInUp” el_class=”custom-hd delay-2″][vc_separator color=”white” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”fadeInUp” el_class=”delay-4″ css=”.vc_custom_1540432882259{margin-bottom: 50px !important;margin-left: 5px !important;padding-top: 15px !important;}”][vc_btn title=”Contact Us Now” color=”danger” size=”lg” link=”url:%23contact-us”][/vc_column][vc_column width=”1/2″][vc_single_image image=”2124″ img_size=”350×150″ alignment=”right” css=”.vc_custom_1647579591891{padding-top: 20px !important;}”][/vc_column][/vc_row][/vc_section][vc_section css_animation=”none” css=”.vc_custom_1575621887487{padding-bottom: 60px !important;}” el_id=”overview”][vc_row][vc_column offset=”vc_hidden-sm vc_hidden-xs”][vc_widget_sidebar sidebar_id=”sidebar-62341b616adcb”][/vc_column][/vc_row][vc_row css=”.vc_custom_1575621899399{padding-top: 80px !important;}”][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_custom_heading text=”overview” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”What is Security Operation Center?” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”20px”][vc_column_text]

Security Operation Center (SOC) adalah proses yang sangat penting bagi perusahaan untuk mengatasi ancaman cybersecurity. Security Operation Center dirancang untuk mendeteksi, merespon, dan menganalisa sistem keamanan sebuah perusahaan dengan proses yang mengkombinasikan talent, proses, dan teknologi.

[/vc_column_text][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][/vc_section][vc_section el_id=”benefits”][vc_row css=”.vc_custom_1647326391783{padding-top: 80px !important;padding-bottom: 50px !important;background-color: #eceff3 !important;}”][vc_column][vc_custom_heading text=”Benefits” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Security Operation Center Benefit” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646122783855{padding-bottom: 80px !important;background-color: #eceff3 !important;}”][vc_column][iconlist class=”custom-image gap-20″][iconlist_item type=”image” class=”aligncenter hover3″ icon_image=”2163″]

Mengatasi Ancaman yang Terdeteksi

[/iconlist_item][iconlist_item type=”image” icon_image=”2165″ class=”aligncenter hover3″]

Mengurangi Ancaman Persisten

[/iconlist_item][iconlist_item type=”image” icon_image=”2166″ class=”aligncenter hover3″]

Mencegah Kerentanan dari Pihak Internal

[/iconlist_item][iconlist_item type=”image” icon_image=”2167″ class=”aligncenter hover3″]

Menekan Kerusakan yang Diakibatkan

[/iconlist_item][iconlist_item type=”image” icon_image=”2168″ class=”aligncenter hover3″]

Memastikan Proses Recovery Tepat Waktu

[/iconlist_item][/iconlist][/vc_column][/vc_row][/vc_section][vc_section el_id=”analist” css=”.vc_custom_1647582584393{padding-top: 80px !important;padding-bottom: 80px !important;}”][vc_row][vc_column][vc_custom_heading text=”Analist Overview” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Analist Overview Security Operation Center” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row][vc_column][iconlist][iconlist_item type=”image” css=”.vc_custom_1648044777947{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Security Operation Center – Level 1
Triage Specialist / Incident Responder

[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1648043855963{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Security Operation Center – Level 2
Incident Handler, Support Engineer

[/iconlist_item][iconlist_item type=”image” css=”.vc_custom_1648043862561{border-top-width: 7px !important;border-top-color: #ff4b36 !important;border-top-style: solid !important;}”]

Security Operation Center – Level 3
Advanced Incident Investigation

[/iconlist_item][/iconlist][/vc_column][/vc_row][vc_row][vc_column width=”1/3″][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648043210545{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Meninjau peringatan terbaru untuk menentukan relevansi dan urgensi.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648043379602{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Membuat permintaan untuk peringatan yang memerlukan tinjauan Analis L2.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648043656126{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Menjalankan pemindaian dan ulasan kerentanan.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648043713673{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Alat pemantauan keamanan terkelola (netflow, IDS, korelasi aturan, dll).[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648043885765{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Meninjau tiket internal dari Analis Level 1.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”bottom”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044008980{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Memanfaatkan ancaman yang muncul untuk mengidentifikasi sistem yang terpengaruh dan cakupan serangan.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”bottom”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044059699{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Meninjau dan mengumpulkan data aset (konfigurasi, proses yang berjalan, dll) untuk penyelidikan lebih lanjut.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044086984{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Menentukan dan mengarahkan upaya remediasi dan pemulihan.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044114926{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Digunakan sebagai titik eskalasi untuk Analis Level 2.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”bottom”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044138061{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Terlibat pada proses penyelidikan serangan lanjutan untuk menentukan tingkat pelanggaran sepenuhnya.[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle”][vc_column_inner width=”1/6″][vc_icon icon_fontawesome=”fas fa-arrow-right” color=”custom” size=”sm” css_animation=”none” custom_color=”#627792″ css=”.vc_custom_1648044237609{padding-top: 10px !important;}”][/vc_column_inner][vc_column_inner width=”5/6″][vc_column_text]Memberikan rekomendasi untuk langkah selanjutnya.[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” css=”.vc_custom_1647582593984{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #eceff3 !important;}” el_id=”process” el_class=”gradient5″][vc_row][vc_column css_animation=”fadeIn” el_class=”delay-1″][vc_custom_heading text=”Process” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Process Security Operation Center” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”60px”][/vc_column][/vc_row][vc_row css=”.vc_custom_1575619514578{padding-bottom: 1px !important;}”][vc_column][iconlist class=”custom-image gap-20″][iconlist_item type=”image” icon_image=”2170″ class=”aligncenter hover3″]

Monitor

[/iconlist_item][iconlist_item type=”image” icon_image=”2169″ class=”aligncenter hover3″]

Deteksi

[/iconlist_item][iconlist_item type=”image” icon_image=”2171″ class=”aligncenter hover3″]

Identifikasi

[/iconlist_item][iconlist_item type=”image” icon_image=”2172″ class=”aligncenter hover3″]

Ases/Nilai

[/iconlist_item][iconlist_item type=”image” icon_image=”2173″ class=”aligncenter hover3″]

Respond

[/iconlist_item][iconlist_item type=”image” icon_image=”2174″ class=”aligncenter hover3″]

Report

[/iconlist_item][/iconlist][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” el_id=”standars” css=”.vc_custom_1647582610752{padding-top: 80px !important;padding-bottom: 80px !important;}”][vc_row][vc_column][vc_custom_heading text=”Our Standards” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Standards” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646120732856{padding-top: 40px !important;}”][vc_column width=”1/6″][ult_content_box][imagebox title=”ISO” image=”1826″]

International Organization for Standardization

[/imagebox][/ult_content_box][/vc_column][vc_column width=”1/6″][imagebox title=”PCI” image=”1827″]

Peripheral Component Interconnect

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”CIS” image=”1828″]

Center of Internet Security

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”OWASP” image=”1829″]

Open Web Application Security Project

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”OSSTMM” image=”1830″]

Open Source Security Testing Methodology Manual

[/imagebox][/vc_column][vc_column width=”1/6″][imagebox title=”ISSAF” image=”1831″]

Information Systems Security Assessment Framework

[/imagebox][/vc_column][/vc_row][/vc_section][vc_section css_animation=”fadeInUp” css=”.vc_custom_1647582628498{padding-top: 80px !important;padding-bottom: 80px !important;background-color: #eceff3 !important;}” el_id=”expertise”][vc_row][vc_column][vc_custom_heading text=”Our Security Expertise” font_container=”tag:h6|font_size:10px|text_align:center|color:%23627792″ use_theme_fonts=”yes” el_class=”style1″][vc_empty_space height=”6px”][vc_custom_heading text=”Our Security Expertise” font_container=”tag:h3|text_align:center” use_theme_fonts=”yes”][/vc_column][/vc_row][vc_row css=”.vc_custom_1646120493776{padding-top: 40px !important;padding-bottom: 40px !important;}”][vc_column width=”1/5″][ult_content_box][/ult_content_box][/vc_column][vc_column width=”1/5″][imagebox title=”CHFI” image=”1832″]

Computer Hacking Forensic Investigator

[/imagebox][/vc_column][vc_column width=”1/5″][imagebox title=”CEH” image=”1833″]

Certified Ethical Hacker

[/imagebox][/vc_column][vc_column width=”1/5″][imagebox title=”OSCP” image=”1834″]

Offensive Security Certified Professional

[/imagebox][/vc_column][vc_column width=”1/5″][/vc_column][/vc_row][/vc_section][vc_row css=”.vc_custom_1647398893803{padding-top: 80px !important;}” el_id=”contact-us”][vc_column width=”1/2″ el_class=”bg-bottom” css=”.vc_custom_1648018975326{padding-top: 80px !important;padding-right: 40px !important;}”][vc_row_inner css=”.vc_custom_1646124959349{padding-right: 10% !important;padding-left: 10% !important;}”][/vc_row_inner][vc_custom_heading text=”Why choose us?” font_container=”tag:h3|font_size:26px|text_align:center” use_theme_fonts=”yes”][vc_empty_space height=”10px”][vc_column_text]

Proxsis Biztech dapat membantu meningkatkan digital transformasi perusahaan Anda dengan cara:

[/vc_column_text][vc_empty_space height=”50px”][vc_row_inner css=”.vc_custom_1646124959349{padding-right: 10% !important;padding-left: 10% !important;}”][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1646132176227{padding-top: 20px !important;padding-bottom: 20px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1846″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”Optimalkan sistem TI” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646126977186{padding-bottom: 5px !important;}”][vc_column_text]Meningkatkan efisiensi serta menurunkan biaya & waktu[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1646132191914{padding-top: 20px !important;padding-bottom: 20px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1847″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”End-to-end Solution” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646126964850{padding-bottom: 5px !important;}”][vc_column_text]Menyelaraskan proses sistem IT dari strategis hingga ke operasional[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner content_placement=”middle” css=”.vc_custom_1646132202418{padding-top: 20px !important;padding-bottom: 20px !important;}”][vc_column_inner width=”1/4″][vc_single_image image=”1848″ img_size=”80×80″ alignment=”center” css_animation=”none”][/vc_column_inner][vc_column_inner width=”3/4″][vc_custom_heading text=”Certified & Professional” font_container=”tag:h5|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1646127025386{padding-bottom: 5px !important;}”][vc_column_text]Tenaga ahli yang berpengalaman dan bersertifikat[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/2″ css=”.vc_custom_1648018968144{padding-right: 0px !important;padding-left: 40px !important;}”][vc_raw_js]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[/vc_raw_js][/vc_column][/vc_row]