Security Operations Center (SOC)


Our Security Operations Center (SOC) identifies and responds to anomalies in time — tirelessly, 24/7.
The service also helps you achieve compliance with the NIS2 directive.

Continuous service to identify security threats in time

The costs caused by serious security incidents are much higher than the costs of preparing for them.

The SOC (Security Operation Center) takes care of your security by monitoring your endpoints, servers, network and cloud by collecting security logs and alerts from your ICT infrastructure. Our SOC team reacts to potential problems, for example, by isolating and containing a potential malware event.

Best of all, you gain the package you need in a clearly priced, monthly and ongoing service. Workstations, servers, cloud services and data are kept safe, whether you’re working from inside or outside your company’s network.

In other words, the security incident management package identifies, detects, classifies, isolates and recovers from detected security incidents in real time, according to the service level agreed with you.

NIS2 Compliance

Ensure NIS2 Compliance with a SOC Service

The NIS2 Directive, which came into effect in October 2024, applies to a wide range of Finnish companies and public administration entities. Read more about the NIS2 security requirements and who is affected by NIS2.

According to the NIS2 Directive, security breaches must be reported within 24 hours, which in practice requires an effective SOC service. Avoid the consequences of non-compliance with the NIS2 Directive.

“With the SOC service, we’ve detected security anomalies that we wouldn’t have noticed on our own. For a small internal IT team, having continuous monitoring in the background is particularly important, especially when our staff are on vacation or sick leave.”

Mika Jääskelä
Head of IT

Why choose Tietokeskus SOC service?

What is a security incident?

A typical example of a security incident is a situation where our SOC service detects that malware has been injected into a particular users workstation, or the workstation is otherwise behaving strangely. It is, therefore, reasonable to assume that someone is trying to access your company’s data or network via the workstation.

How Tietokeskus react to a security incident?

When a security incident occurs, the SOC team receives an alert. We have agreed with you a severity level above which we will automatically and quickly isolate the workstation from the rest of your business network.

Interested in our SOC services?

Leave your contact details and we will be in touch.