Atos Launches World-first Prescriptive Security Operations Center (SOC) with Automated Response

Atos, a global leader in digital transformation, announced the launch of its new prescriptive Security Operations Center (SOC).

Combined with Atos Big Data analytics capabilities and powered by Bullion servers, the new security solution makes it possible for customers to predict security threats before they even occur. Detection and neutralization time is improved significantly compared to existing solutions.

Atos builds on its existing and proven assets to deliver the Prescriptive SOC. The Atos Data Lake Appliance powered by Bullion and Atos research in Artificial Intelligence are in the heart of what makes Atos Prescriptive SOC unique.

To face the increasing number of ever more sophisticated cyberattacks, (such as ransomware, DDos, botnet, Advanced Persistent Threats), customers require constant and efficient security solutions so that they can remain focused on their core business.

Based on Big Data analytics and Machine Learning technology and combined with McAfee Technologies, the prescriptive SOC continuously learns from previous threats and manages to orchestrate automated responses in real-time.

The detection time can be reduced to less than a minute, versus an average of 190 days with existing solutions, and the total response and recovery time can be reduced to a few minutes compared to a couple of months today.

The prescriptive SOC leverages McAfee Open Data Exchange Layer (Open-DXL) and Threat Defence Life Cycle technologies to enhance automation, orchestration and the immediate reactivity of security responses in order to eliminate fragmented and time-consuming manual security responses.

With its prescriptive security analytics capabilities, the solution analyses and correlates high volumes of structured and unstructured data from different sources (IT, OT and IoT), and monitors not only the internal customer network but also the social networks, the deep web and the dark web, for a full environment screening. The data is transformed into intelligence with deep packet analysis, pattern recognition and weak signal detection.

Also Read

Stay in the know with our newsletter