Intrusion monitoring and detection are two critical activities today to proactively respond to sophisticated threats and attacks on your IT infrastructure, applications, business services, and most importantly your critical data. With our BABDOUM platform, we have the right tools and competent, experienced and certified experts to help you. Our platform includes among others:

  • Technologies such as SIEM, HDS Probes and HIPS, Syslog
  • Processes and procedures (eg Playbooks)
  • Threats Intelligence
  • Experts in monitoring and intrusion detection

Intrusion monitoring and detection is available 24/7/365. We also rely on effective solutions offered by our strategic partners

To find out more about the services offered by BABDOUMBABDOUM Services

To achieve our goals and those of our customers, we have a Security Operations Center (SOC) equipped with technologies (network probe and system [NIDS and HIDS], monitoring console, etc.), processes and procedures (ex. playbooks) and experts and threat intelligence. Our Center:

  • Monitors real-time IT infrastructure, applications and business services on-site or outsourcing (cloud computing)
  • Analyze security events in a continuous watch activity
  • Detects security threats, attacks, and incidents, including zero-day attacks
  • Alert customers when they are targeted by hackers
  • Provides IOCs (IP address, URL, Domain, Hash, etc.) to clients
  • Advise customers on how to deal with attacks and incidents

We use tools, technologies, and software such as Snort, Surricata, Bro, Wazuh, Sysmon, Syslog, Syslog-ng, OSSEC, SNMPv3, Elasticseach, Kibana, Logstash, Logcheck, etc.

We can also deploy solutions such as AT & T Cybersecurity USM and McAfee in collaboration with strategic partners

  • 24/7/365 Monitoring and intrusion detection
  • Notification of attacks and security incidents
  • Technical Security Advisory
  • Incident Reports
  • Proactive threat detection and sophisticated attacks
  • Compliance (eg PCI-DSS)
  • Improved security visibility of the network and systems
  • Collecting of IOCs and Evidence for Investigative Need
  •  Improved Incident Response Process

Here is why our customers trust us

Customers's Experience counts

CAPTOSEC takes the needs and requirements of its customers to heart.

We love the quality

CAPTOSEC relies on a holistic quality assurance process that helps enhance the deliverables and meet the customer’s satisfaction.

A motivated team with the right tools

By using right tools combined with good processes, CAPTOSEC meets the stakeholders’s expectations.

We always resect the time

CAPTOSEC’s Security Professionals listen and collaborate with clients throughout all phases of projects.

Our security professionals are all certified

In addition to their experience and skills, Security Professionals from CAPTOSEC hold Industry certifications such as CISSP, CASP, C|EH, CISM, CISA, Security+, CCIE, RHCA, PMP, E|CIH.

Autre Expertise de CAPTOSEC

Conception, développement et amélioration des processus de sécurité de l'information

Élaboration et mise en oeuvre des politiques, des orientations et des lignes directrices de sécurité de l'information

Modélisation des menaces, Analyse de risques et Recommandations

Assurance Qualité des biens livrables en sécurité de l'information

Conseil, formation et sensibilisation sur la sécurité de l'information

Conception et développement des outils de sécurité (gabarits, formulaires, scripts, etc.)

Audit et Évaluation de la sécurité des Réseaux, Systèmes, Applications et Données

Accompagnement des clients dans leurs processus d'acquisition de logiciels et matériels

Test d'intrusion des Applications, Réseaux et Systèmes

Conception et Test des plans de continuité et de reprise d'activité

Protection des réseaux, systèmes et équipements de sécurité

Détection d'intrusion et investigation forensique

Accompagnement sécuritaire des projets

Notre Méthodologie

Nous comprenons les besoins et contextes du client

Nous validons avec le client, la portée et les livrables à produire

Nous collaborons tout au long des phases du projet

Nous utilisons des standards, bonnes pratiques et un processus d'Assurance Qualité